Thursday, April 24, 2025
HomeCyber AttackNew Double-Edged Email Attack Steals Office 365 Credentials and Delivers Malware

New Double-Edged Email Attack Steals Office 365 Credentials and Delivers Malware

Published on

SIEM as a Service

Follow Us on Google News

Cybersecurity experts have uncovered a sophisticated phishing campaign that employs a double-edged tactic to compromise Office 365 credentials and deliver malware, posing significant risks to organizations worldwide.

The campaign, identified by the Cofense Phishing Defense Center (PDC), uses a file deletion reminder as a pretext to trick victims into engaging with what appears to be a legitimate email from a trusted file-sharing service.

Email Body

When victims click on the hyperlinked document name, they are directed to a legitimate files.fm link, enhancing the email’s credibility. However, this is where the deception unfolds.

- Advertisement - Google News

Opening the shared PDF file triggers two different attacks, offering victims a ‘choice’ of poison: either a phishing attempt for Office 365 credentials or the download of malicious software.

Double-Edged Email Attack
Opened PDF file

Phishing for Office 365 Credentials

Upon clicking the “Preview” hyperlink, victims are taken to a deceptive login page that mimics Microsoft’s own, prompting them to enter their credentials.

Double-Edged Email Attack
Fake Microsoft Login (Phish Page)

This page, while appearing trustworthy, presents telltale signs of phishing, such as an incorrect URL and an unusual request for credentials for a shared document.

Conversely, the “Download” link initiates the download of an executable file named ‘SecuredOneDrive.ClientSetup.exe.’

This file, disguised as a OneDrive installer, unleashes ConnectWise RAT (Remote Access Trojan) malware, which hijacks the legitimate ConnectWise Control tool for unauthorized access and lateral movement within the compromised networks.

Technical Analysis

Upon execution, the malware installs itself as a system service, ensuring its persistence through Windows registry modifications and connecting to command and control servers to manage the infected systems remotely.

The technical analysis reveals:

  • Execution: The malware processes named ScreenConnect.ClientService.exe and ScreenConnect.WindowsClient.exe, indicative of ConnectWise’s legitimate software being exploited.
  • Remote Connection: Connection to a non-malicious ConnectWise IP but control is orchestrated through a separate command and control server, showcasing a layered approach to evasion and control.

This attack underscores the critical need for user awareness and education in cybersecurity. Organizations must:

  • Educate employees about recognizing suspicious emails, especially those with unexpected requests or unusual sender addresses.
  • Implement solutions like Cofense Managed Phishing Detection and Response (MPDR) to enhance defenses against such sophisticated threats.

The technical sophistication of this attack highlights not just the evolving nature of cyber threats but also the importance of integrating human vigilance with technological safeguards to protect digital infrastructures.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Blue Shield Exposed Health Data of 4.7 Million via Google Ads

Blue Shield of California has disclosed a significant data privacy incident affecting up to...

Microsoft Offers $30,000 Bounties for AI Security Flaws

Microsoft has launched a new bounty program that offers up to $30,000 to security...

The Human Firewall: Strengthening Your Weakest Security Link

Despite billions spent annually on cybersecurity technology, organizations continue to experience breaches with alarming...

WhatsApp Launches Advanced Privacy Tool to Secure Private Chats

WhatsApp, the world’s leading messaging platform, has unveiled a major privacy upgrade called "Advanced...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Blue Shield Exposed Health Data of 4.7 Million via Google Ads

Blue Shield of California has disclosed a significant data privacy incident affecting up to...

Microsoft Offers $30,000 Bounties for AI Security Flaws

Microsoft has launched a new bounty program that offers up to $30,000 to security...

The Human Firewall: Strengthening Your Weakest Security Link

Despite billions spent annually on cybersecurity technology, organizations continue to experience breaches with alarming...