Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

APT28 uses webhook-based macro malware to target European companies

OpenAI brings in consultants to promote the company

Wormable XMRig campaign uses BYOVD exploit and time-based logic bombs

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Gamma AI platform abused in phishing chain spoofs Microsoft sharepoint login
Identity

Gamma AI platform abused in phishing chain spoofs Microsoft sharepoint login

userBy userApril 16, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

A sophisticated email attack chain

Threat actors leverage an artificial intelligence (AI)-driven presentation platform named Gamma in their phishing attacks to direct unsuspecting users to spoofed Microsoft login pages.

“Attackers weaponize Gamma, a relatively new AI-based presentation tool, to provide a link to a fraudulent Microsoft SharePoint login portal,” anomalous security researchers Callie Hinman Baron and Piotr Wojtyla said in an analysis Tuesday.

The attack chain is launched with a phishing email. In some cases, it is sent from a legitimate compromised email account and tempts message recipients to open an embedded PDF document.

In reality, a PDF attachment is nothing more than a hyperlink that redirects the victim to a presentation that hosts its victim in gamma when clicked.

In doing so, the user will impersonate Microsoft and use it for intermediate pages that tell them to complete the CloudFlare turnstyle validation step before accessing the expected document. This Captcha barrier helps to improve the legitimacy of attacks and prevent automated URL analysis by security tools.

Cybersecurity

The target will then be taken to a phishing page that is intended to collect credentials, pose as a Microsoft SharePoint sign-in portal.

“If mismatched credentials are provided, trigger a ‘incorrect password’ error. This indicates that the perpetrator is using some kind of enemy (AITM) to verify their credentials in real time,” the researcher said.

The findings are part of a continuing trend in phishing attacks that use legitimate services on malicious content and bypass email authentication checks such as SPF, DKIM, DMARC.

“This clever multi-stage attack shows how today’s threat attacks are being carried out by avoiding blind spots created by lesser-known tools, deceiving unsuspecting recipients and compromising accounts,” the researchers said.

A sophisticated email attack chain

“As opposed to link directly to the Credential Harvest page, the attacker routes the user through several mediation steps: first to a gamma host presentation, then to a splash page protected by cloudflare turnstyle, and finally to a spoofed Microsoft login page.

The disclosure warned that Microsoft would increase AI-driven fraud attacks in its latest cybersignal report, and that it would use deepfakes, voice cloning, phishing emails, fake websites that look real, and Bogus jobs to generate reliable content for large-scale attacks.

“AI tools can scan the company’s information to scrape the web, allowing attackers to build detailed profiles of employees or other targets to create highly compelling social engineering lures,” the company said.

“In some cases, bad actors use fake AI-enhanced product reviews and AI-generated storefronts to invite victims to increasingly complex fraud schemes, and scammers create an entire website and an entire e-commerce brand with fake business history and customer testimony.”

Cybersecurity

Microsoft also said it took action against the attacks organized by Storm-1811 (aka STAC5777). This allowed Microsoft’s Quick Assist software to pause by supporting it through a voice phishing scheme implemented through a team, and to grant remote device access for subsequent ransomware deployment.

That said, there is evidence to suggest that the cybercriminal groups behind the Team Vising campaign may be changing tactics. According to a new report from ReliaQuest, attackers have been observed to employ a permanent method that has not been previously reported, using Typelib Com hijacking and a new PowerShell backdoor, to avoid detection and maintain access to compromised systems.

Threat actors have been developing versions of PowerShell malware since January 2025, and are said to be deploying early iterations via malicious Bing ads. Detected two months later, the activity targets targeted customers in the financial and professional, scientific and technical services sectors, with a focus on executive-level employees with names like female sound.

The later stages of the attack cycle increased the likelihood that Storm-1811 has evolved in a new way, or that it is the work of the shard group, or that a completely different threat actor has adopted the same initial access technology exclusive to it.

“The phishing chat was carefully timed, landing from 2pm to 3pm, perfectly synchronized with the receiver’s local time, coinciding with an afternoon slump where employees were less wary when they spot malicious activities,” ReliaQuest said.

“Whether or not this Microsoft team’s phishing campaign was run by Black Basta, it’s clear that phishing by Microsoft teams is not going anywhere. Attackers continue to find smart ways to bypass defenses and stay within their organization.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleChina’s XI with Malaysia praises “New Golden Age” during trade tour | International Trade News
Next Article Cosmic Robotics robots can speed up solar panel deployment
user
  • Website

Related Posts

APT28 uses webhook-based macro malware to target European companies

February 23, 2026

Wormable XMRig campaign uses BYOVD exploit and time-based logic bombs

February 23, 2026

Double-Tap Skimmers, PromptSpy AI, 30Tbps DDoS, Docker Malware & More

February 23, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

APT28 uses webhook-based macro malware to target European companies

OpenAI brings in consultants to promote the company

Wormable XMRig campaign uses BYOVD exploit and time-based logic bombs

Guide Labs Debuts New Kind of Interpretable LLM

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.