Security News > 2021 > April > Microsoft Office SharePoint Targeted With High-Risk Phish, Ransomware Attacks

SharePoint servers are being picked at with high-risk, legitimate-looking, branded phish messages and preyed on by a ransomware gang using an old bug.
The phish is targeting Office 365 users with a legitimate-looking SharePoint document that claims to urgently need an email signature.
Jeff Costlow, CISO of ExtraHop, told Threatpost on Wednesday that the ransomware attacks against the 2019 vulnerability affecting SharePoint servers are the more insidious threat in the double whammy, in that they install remote control software and thus allow direct access to the infrastructure where attackers can freely frolic.
"Anyone using SharePoint needs to ensure that they are patching any instances of SharePoint to avoid the malware/ransomware installations. Long term, no amount of patching will solve the phishing problem. It's too easy for attackers to build sites that mimic legitimate sites. We need to rethink how sharing is done. Security teams need to take a proactive stance to help their users conduct business safely. There are various tactics to help alert users to possible attacks, such as setting up each SharePoint server to use a familiar background or image for users to ensure that they only input credentials on legitimate sites."
Cofense told Threatpost in an email on Wednesday morning that there's no apparent connection between the SharePoint phishing campaign that its analysts uncovered and the Wickr/Hello ransomware gang's ongoing exploitation of SharePoint server vulnerabilities.
Finally, the criminal ransomware attackers come in, socialize the exploit on Dark Net sites and use it to launch their own attacks.
News URL
https://threatpost.com/sharepoint-phish-ransomware-attacks/165671/
Related news
- Fake Microsoft Office add-in tools push malware via SourceForge (source)
- US indicts Black Kingdom ransomware admin for Microsoft Exchange attacks (source)
- Microsoft: Windows CLFS zero-day exploited by ransomware gang (source)
- Microsoft: Windows CLFS Vulnerability Could Lead to ‘Widespread Deployment and Detonation of Ransomware’ (source)
- Sensata Technologies hit by ransomware attack impacting operations (source)
- Microsoft releases emergency update to fix Office 2016 crashes (source)
- Ransomware attack cost IKEA operator in Eastern Europe $23 million (source)
- Microsoft Defender will isolate undiscovered endpoints to block attacks (source)
- Kidney dialysis firm DaVita hit by weekend ransomware attack (source)
- Microsoft blocks ActiveX by default in Microsoft 365, Office 2024 (source)