A sophisticated spearphishing operation has emerged, aiming at executives and senior leaders across multiple sectors by leveraging the trusted appearance of OneDrive document-sharing alerts. Identified by the Stripe OLT SOC, this attack uses highly personalized emails that mimic internal HR communications, luring recipients into credential theft via a fake Microsoft Office/OneDrive login page. Subject lines such as “Salary amendment” or “FIN_SALARY” are crafted to provoke urgency and concern, increasing the likelihood of engagement from time-pressed C-suite professionals. Threat actors are crafting deceptive OneDrive notifications to lure executives into disclosing their login credentials. The link leads to a realistic-looking login page tailored with the victim’s name and company details to steal credentials. These emails are distributed via Amazon SES, using around 80 rotating domains registered through Mat Bao and WebNic.cc. DNS is handled by Cloudflare and Luxhost, while phishing pages are hosted on Akamai Cloud. To avoid detection, attackers first send harmless emails to build trust before launching the actual phishing attempt. This campaign poses a serious threat due to its advanced evasion tactics. Attackers conceal characters and disguise key trigger words such as “Open” and “Share” within both light and dark mode email formats, making them harder for security filters to detect. In dark mode, randomized alphanumeric strings break up detection patterns, while single-use phishing URLs self-destruct after access, complicating incident response and forensic analysis. These tactics make it difficult for traditional security tools to identify and block the threat effectively. To reduce organizational risk, it's important to boost executive understanding and reinforce security measures. Provide training for executives and their assistants on phishing attacks that appear to come from HR departments. Enforce strict policies for verifying links and encourage immediate reporting of any suspicious messages. Run simulated phishing exercises for administrative staff, and have security teams block potentially dangerous SES domains. Leverage Microsoft Sentinel with tailored queries to identify and track emerging cyber threats.
A researcher scheduled to demonstrate a $1 million zero-click remote code execution (RCE) exploit against WhatsApp at Pwn2Own Ireland 2025 withdrew the public demo and instead priv...
Famous Chollima, a DPRK-aligned threat cluster, has been consolidating its infostealers—melding BeaverTail and OtterCookie capabilities—to harvest credentials and cryptocurrenc...
Qilin, also known as Agenda, Gold Feather, and Water Galura, has become one of the most active ransomware-as-a-service (RaaS) groups in 2025, claiming over 40 victims monthly since...