Close Menu
  • Identity
  • Startups
  • Tech
  • Spanish
What's Hot

Chrome 0-Day, 7.3 Tbps DDoS, MFA Bypass Tricks, Banking Trojan and More

First Alumni Celebrated in Excel London

Side-tip physics for operating a fusion power plant

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Identity
  • Startups
  • Tech
  • Spanish
Fyself News
Home » Gamma AI platform abused in phishing chain spoofs Microsoft sharepoint login
Identity

Gamma AI platform abused in phishing chain spoofs Microsoft sharepoint login

userBy userApril 16, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

A sophisticated email attack chain

Threat actors leverage an artificial intelligence (AI)-driven presentation platform named Gamma in their phishing attacks to direct unsuspecting users to spoofed Microsoft login pages.

“Attackers weaponize Gamma, a relatively new AI-based presentation tool, to provide a link to a fraudulent Microsoft SharePoint login portal,” anomalous security researchers Callie Hinman Baron and Piotr Wojtyla said in an analysis Tuesday.

The attack chain is launched with a phishing email. In some cases, it is sent from a legitimate compromised email account and tempts message recipients to open an embedded PDF document.

In reality, a PDF attachment is nothing more than a hyperlink that redirects the victim to a presentation that hosts its victim in gamma when clicked.

In doing so, the user will impersonate Microsoft and use it for intermediate pages that tell them to complete the CloudFlare turnstyle validation step before accessing the expected document. This Captcha barrier helps to improve the legitimacy of attacks and prevent automated URL analysis by security tools.

Cybersecurity

The target will then be taken to a phishing page that is intended to collect credentials, pose as a Microsoft SharePoint sign-in portal.

“If mismatched credentials are provided, trigger a ‘incorrect password’ error. This indicates that the perpetrator is using some kind of enemy (AITM) to verify their credentials in real time,” the researcher said.

The findings are part of a continuing trend in phishing attacks that use legitimate services on malicious content and bypass email authentication checks such as SPF, DKIM, DMARC.

“This clever multi-stage attack shows how today’s threat attacks are being carried out by avoiding blind spots created by lesser-known tools, deceiving unsuspecting recipients and compromising accounts,” the researchers said.

A sophisticated email attack chain

“As opposed to link directly to the Credential Harvest page, the attacker routes the user through several mediation steps: first to a gamma host presentation, then to a splash page protected by cloudflare turnstyle, and finally to a spoofed Microsoft login page.

The disclosure warned that Microsoft would increase AI-driven fraud attacks in its latest cybersignal report, and that it would use deepfakes, voice cloning, phishing emails, fake websites that look real, and Bogus jobs to generate reliable content for large-scale attacks.

“AI tools can scan the company’s information to scrape the web, allowing attackers to build detailed profiles of employees or other targets to create highly compelling social engineering lures,” the company said.

“In some cases, bad actors use fake AI-enhanced product reviews and AI-generated storefronts to invite victims to increasingly complex fraud schemes, and scammers create an entire website and an entire e-commerce brand with fake business history and customer testimony.”

Cybersecurity

Microsoft also said it took action against the attacks organized by Storm-1811 (aka STAC5777). This allowed Microsoft’s Quick Assist software to pause by supporting it through a voice phishing scheme implemented through a team, and to grant remote device access for subsequent ransomware deployment.

That said, there is evidence to suggest that the cybercriminal groups behind the Team Vising campaign may be changing tactics. According to a new report from ReliaQuest, attackers have been observed to employ a permanent method that has not been previously reported, using Typelib Com hijacking and a new PowerShell backdoor, to avoid detection and maintain access to compromised systems.

Threat actors have been developing versions of PowerShell malware since January 2025, and are said to be deploying early iterations via malicious Bing ads. Detected two months later, the activity targets targeted customers in the financial and professional, scientific and technical services sectors, with a focus on executive-level employees with names like female sound.

The later stages of the attack cycle increased the likelihood that Storm-1811 has evolved in a new way, or that it is the work of the shard group, or that a completely different threat actor has adopted the same initial access technology exclusive to it.

“The phishing chat was carefully timed, landing from 2pm to 3pm, perfectly synchronized with the receiver’s local time, coinciding with an afternoon slump where employees were less wary when they spot malicious activities,” ReliaQuest said.

“Whether or not this Microsoft team’s phishing campaign was run by Black Basta, it’s clear that phishing by Microsoft teams is not going anywhere. Attackers continue to find smart ways to bypass defenses and stay within their organization.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleChina’s XI with Malaysia praises “New Golden Age” during trade tour | International Trade News
Next Article Cosmic Robotics robots can speed up solar panel deployment
user
  • Website

Related Posts

Chrome 0-Day, 7.3 Tbps DDoS, MFA Bypass Tricks, Banking Trojan and More

June 23, 2025

Spiders scattered behind M&S and cooperative cyberattacks, with up to $592 million in damages

June 21, 2025

Qilin ransomware adds “Cole Lawyer” feature that puts pressure on victims for larger ransoms

June 20, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Chrome 0-Day, 7.3 Tbps DDoS, MFA Bypass Tricks, Banking Trojan and More

First Alumni Celebrated in Excel London

Side-tip physics for operating a fusion power plant

Polemos has launched $PLMS tokens on MEXC and UNISWAP, moving forward with Web3 gaming infrastructure

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Polemos has launched $PLMS tokens on MEXC and UNISWAP, moving forward with Web3 gaming infrastructure

How a hardware wallet protects your private key: Security and safety instructions

Top Startups and High-Tech Funding News for the Weekly Ends June 20, 2025

Apple is talking to you to win AI startup confusion

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.