News: 1769109538

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

Crims compromised energy firms' Microsoft accounts, sent 600 phishing emails

(2026/01/22)


Unknown attackers are abusing Microsoft SharePoint file-sharing services to target multiple energy-sector organizations, harvest user credentials, take over corporate inboxes, and then send hundreds of phishing emails from compromised accounts to contacts inside and outside those organizations.

The attackers likely used previously-compromised email addresses to gain initial access to "multiple" energy-sector organizations targeted in this campaign, according to Redmond, which detailed the digital intrusions in a Wednesday report.

These emails contained a SharePoint URL requiring user authentication and subject lines such as "New Proposal - NDA" to make them appear legitimate. People who clicked on the URL were redirected to a website that required them to enter user credentials, thus giving the criminals valid usernames and passwords to use in later stages of these attacks.

[1]

Then, the attackers signed in to the compromised accounts with another IP address and created an inbox rule to delete all incoming emails and mark all the emails as read. And from these compromised inboxes, the miscreants sent out new [2]phishing emails - in one case involving more than 600 emails sent with another phishing URL.

[3]

[4]

"The emails were sent to the compromised user's contacts, both within and outside of the organization, as well as distribution lists," the Microsoft researchers [5]said . "The recipients were identified based on the recent email threads in the compromised user's inbox."

In this particular case, after sending out the new phishing emails, the attacker kept an eye on the victim's inbox, deleting any out-of-office or undeliverable messages. They also read email responses and responded to any questions about the legitimacy of the phish. These emails and responses were also later deleted by the attacker.

[6]

Anyone from within an energy org who clicked on the malicious URL was also targeted for credential theft and account takeover.

The Register asked Microsoft how many organizations were compromised, if its threat hunters have any idea who is behind these attacks, and whether they remain ongoing. We didn't receive any answers from Redmond, but will update this story if and when that changes.

[7]AI makes phishing 4.5x more effective, Microsoft says

[8]Death to one-time text codes: Passkeys are the new hotness in MFA

[9]One criminal, 50 hacked organizations, and all because MFA wasn't turned on

[10]Don't click on the LastPass 'create backup' link - it's a scam

While the usual recommendation for any type of identity compromise is to reset the password, in these types of [11]attacker-in-the-middle scams - where the criminal intercepts and relays messages between two parties, allowing them to steal sensitive data and [12]snoop on victims' communications - a password reset alone isn't sufficient to address the issue.

"Even if the compromised user's password is reset and sessions are revoked, the attacker can set up persistence methods to sign-in in a controlled manner by tampering with MFA," Redmond warns. "For instance, the attacker can add a new MFA policy to sign in with a one-time password (OTP) sent to the attacker's registered mobile number. With these persistence mechanisms in place, the attacker can have control over the victim's account despite conventional remediation measures."

Still, [13]multi-factor authentication (MFA) "remains an essential pillar" in stopping a range of cyber threats, so [14]do enable that .

[15]

Microsoft also suggests enabling conditional access policies that evaluate sign-in requests using additional identity-driven signals like user or group membership, IP location information, and device status. If these signals trigger a security alert, the suspicious sign-in is denied.

Investing in anti-phishing products that scan incoming messages and visited websites can also help. ®

Get our [16]Tech Resources



[1] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aXKsFBdzBnmiQlgA9oKD_AAAAco&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0

[2] https://www.theregister.com/2025/10/16/ai_makes_phishing_45x_more_effective/

[3] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aXKsFBdzBnmiQlgA9oKD_AAAAco&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[4] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aXKsFBdzBnmiQlgA9oKD_AAAAco&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[5] https://www.microsoft.com/en-us/security/blog/2026/01/21/multistage-aitm-phishing-bec-campaign-abusing-sharepoint/

[6] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aXKsFBdzBnmiQlgA9oKD_AAAAco&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[7] https://www.theregister.com/2025/10/16/ai_makes_phishing_45x_more_effective/

[8] https://www.theregister.com/2025/12/06/multifactor_authentication_passkeys/

[9] https://www.theregister.com/2026/01/06/50_global_orgs_hacked/

[10] https://www.theregister.com/2026/01/21/lastpass_backup_phishing_campaign/

[11] https://www.theregister.com/2025/11/23/infosec_news_in_brief/

[12] https://www.theregister.com/2025/11/11/llm_sidechannel_attack_microsoft_researcher/

[13] https://www.theregister.com/2025/12/06/multifactor_authentication_passkeys/

[14] https://www.theregister.com/2026/01/06/50_global_orgs_hacked/

[15] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aXKsFBdzBnmiQlgA9oKD_AAAAco&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[16] https://whitepapers.theregister.com/



cd

MFA is compromise-able, but please keep using it. We need the extra data points.

Abandon the search for Truth; settle for a good fantasy.