Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Platform Gamma AI with Violence in the Phishing Chain to cheat Microsoft SharePoint Logins
Global Security

Platform Gamma AI with Violence in the Phishing Chain to cheat Microsoft SharePoint Logins

AdminBy AdminApril 16, 2025No Comments4 Mins Read
Sophisticated Email Attack Chain
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


A sophisticated e -mail attack chain

Actors threats use the specified artificial intelligence platform (AI) Range In phishing attacks to direct unburable users to fake Microsoft.

“The attackers are armed with Gamma, a relatively new AI -based presentation tool to deliver a link to a fake portal Microsoft SharePoint Login,” Pathological Researchers Hinman Baron and Piotr Wojtyla – Note Tuesday analysis.

The attack network begins with a phishing email, in some cases sent from legitimate, broken e -mail accounts to attract the recipients of messages to open the built -in PDF document.

In reality, pdf attachment is nothing but a hyperlink that, when pressed, retains the victim to the presentation on Gamma, which offers them to press the button to “consider safe documents”.

This takes the user on an intermediate page that pretends to be Microsoft and orders them to complete the cloudflare tournicer’s check before accessing the intended document. This CAPTCHA barrier serves to increase the legitimacy of the attack, as well as prevent automated security tools.

Cybersecurity

The target targets are then transferred to a phishing page that is masked as a Microsoft SharePoint portal and seeks to collect your credentials.

“If inappropriate credentials are provided, it causes an” wrong password “error that shows that criminals use some The opponent in the middle (Aith) To verify the powers in real time, “the researchers noted.

The conclusions are part of the constant tendency of phishing attacks that operate legitimate services for malware and bypass authentication checks such as SPF, DKIM and DMARC, technique called ouses from VesMany).

“This reasonable, multi-stage attack shows how today’s threat actuals use blind spots created by less known tools to identify the parties, cheat on anything suspected recipients and compromise,” the researchers said.

A sophisticated e -mail attack chain

“Instead of directly referring to the page that covers the credentials, the attackers send the user through a few intermediaries: first to the presentation in the gamma, and then on the outbreak page protected by this Cloudflare Turnstile, and finally for the forgery of the Microsoft page. static reference analysis to overcome the way. “

Disclosure is going on as Microsoft, in it Report on the latest cyber -signsThey warned of increasing the attacks of fraud that form AI to create plausible content for attacks using Geepfakes, voice cloning, phishing sheets, real fake sites and false work lists.

“AI’s tools can scan and promote the Internet for information about the company, helping the attackers create detailed employees profiles or other goals to create very convincing bait social engineering,” the company said.

“In some cases, bad actors seize the victims of more complex fraud schemes, using fake products of AI-consuming products and showcases that have received AI, where scammers create whole websites and e-commerce brands in the complete business and customer reviews.”

Cybersecurity

Microsoft also stated that took measures against the attacks organized Storm-1811 (AKA STAC5777), which abused Microsoft Quick Assist software, creating how it supports via voice phishing schemes conducted through the teams and convincing the victims to provide them with deleted access to the device for subsequent deployment.

Given this, there is data that suggest that a group of cybercrime behind the team that strives for the company can move tactics. According to the new report from Reliaquest, the attackers watched Typelib Com according to and the new back of the PowerShell to evade and maintain access to the impaired systems.

The threatening actor is said to develop malicious PowerShell software since January 2025, deploying early iterations through malicious advertisements. The activity revealed two months later sent customers in the finance and professional, scientific and technical services sector, in particular, focusing on employees at the executive level with the surnames of women.

Changes in the late stages of the attack cycle caused the possibility that the Storm-1811 is either developing with new methods, or this is a weakening work, or that a completely different actor threatened took the same initial access methods that were exceptional to him.

“The phishing chats were carefully timed, landing between 14:00 to 15:00, perfectly synchronized with local time organizations and coincided with the afternoon, in which employees may be less wary in the malicious activity, reliaquest – Note.

“No matter whether this Microsoft Physhing Company has ruled Black Basta, it is clear that phishing through Microsoft teams is not going anywhere. The attackers continue to find reasonable ways to work out and stay in organizations.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.