Description

Perception Point’s latest findings reveal a sophisticated two-step phishing technique that exploits Microsoft Visio files (.vsdx) and SharePoint to launch deceptive credential theft campaigns. Traditionally used for creating diagrams like flowcharts and network maps, Microsoft Visio files are now being weaponized by cybercriminals. In these phishing attacks, Visio files are embedded with malicious URLs, creating a two-step path designed to deceive and bypass security systems. The method relies on the trust users have in widely used platforms like SharePoint and Microsoft Visio. Attackers host compromised Visio files on SharePoint accounts and embed malicious links within the .vsdx files. These files are delivered through phishing emails, often appearing to come from legitimate, trusted sources. Since the emails originate from real accounts, they pass basic authentication checks like SPF, making them harder to detect. The attack follows a two-step process. In the first step, attackers use breached email accounts to send emails containing links to SharePoint-hosted Visio files or attachments. In the second step, when victims click the link, they are directed to a fake Microsoft 365 login page designed to steal their credentials. To bypass automated security, attackers trick victims into holding down the Ctrl key while clicking the malicious link, a tactic that avoids detection by email scanners. Perception Point's research indicates a significant rise in attacks using this method, targeting organizations worldwide. The report stresses that these phishing campaigns exploit both technical vulnerabilities and human psychology, making them particularly effective at evading detection. Organizations are urged to be extra vigilant against these sophisticated attacks.