The VEILDrive campaign exploits Microsoft’s trusted SaaS infrastructure—including Teams, SharePoint, Quick Assist, and OneDrive—to evade detection and deploy malware, according to a report from Israeli cybersecurity company Hunters. The campaign, first identified in September 2024, involved attackers leveraging legitimate services to carry out spear-phishing attacks. A critical infrastructure organization in the U.S., labeled “Org C,” was targeted, with the attackers posing as internal IT team members. By impersonating an IT team from an organization identified as “Org A,” the threat actors sent Teams messages to Org C employees and requested remote access using Quick Assist, successfully sidestepping standard detection measures. The attackers continued by sending a SharePoint link containing a ZIP file “Client_v8.16L.zip” with remote access software, LiteManager, to establish scheduled tasks for maintaining access. They later used the same approach to download a second ZIP file, containing Java-based malware in a JAR file, along with the full Java Development Kit (JDK) for execution. This malware connected to a OneDrive account under the control of the adversary using hard-coded credentials to run PowerShell commands via the Microsoft Graph API. As a backup, the malware could connect to an Azure virtual machine for additional command execution, thus ensuring continuity in control. This approach is notable as it lacks obfuscation, is well-organized, and defies typical evasion techniques, making it readable and straightforward. The method of exploitation aligns with similar abuse of Microsoft services seen in past cyber incidents, such as the use of Quick Assist in Storm-1811’s campaign earlier in 2024 to distribute ransomware. Microsoft previously warned of this trend, which exploits SaaS services like OneDrive and SharePoint to bypass conventional defenses.
A large-scale phishing campaign has been identified leveraging RFQ (Request for Quotation) themed emails to distribute credential-stealing malware. Attackers disguise malicious HTM...
Two critical vulnerabilities in Progress ShareFile have been identified that can be chained to achieve pre-authentication remote code execution (RCE). Discovered by watchTowr resea...
The FBI has issued a warning highlighting potential security and privacy risks associated with widely used mobile applications developed by Chinese companies. These applications, a...