Friday, June 13, 2025
Advertisements

Phishing Campaign Mimics OneNote Login to Steal Office365 Credentials

by Charline

Cybersecurity researchers have uncovered an ongoing phishing campaign that uses fake Microsoft OneNote login pages to steal Office365 and Outlook credentials. The attackers primarily target users in Italy and the United States, using trusted platforms and Telegram bots to carry out the attack and exfiltrate stolen data.

How the Attack Works

The phishing campaign begins with emails that appear to come from Microsoft, using subject lines like “New Document Shared with you.” These emails redirect victims to fraudulent OneNote login pages hosted on platforms like Notion, Glitch, Google Docs, and RenderForest.

These fake login pages offer multiple authentication options, including Office365, Outlook, Aruba Mail, PEC (Italy’s certified email system), and others—making the attack more believable to victims.

Advertisements

Targeting Italian Users

According to a report by ANY.RUN, the phishing emails and domains often use Italian language and naming conventions. The campaign has been active since at least January 2022, showing long-term planning and persistence.

Advertisements

Credential Theft via Telegram Bots

The phishing pages use JavaScript to collect login credentials and capture victims’ IP addresses using the ipify.org service. The stolen data is then sent to the attackers through Telegram bots using hardcoded bot tokens and chat IDs.

Advertisements

Telegram bots used in the campaign include:

Advertisements
  • @Sultannanewbot
  • @remaxx24bot
  • @Resultantnewbot

After credentials are stolen, the phishing site redirects users to the real Microsoft OneNote login page to avoid suspicion.

Evolving Techniques

The campaign has evolved technically over time. Early attacks used basic web forms and simple URL encoding. In February 2022, the attackers began using Telegram bots for data exfiltration, along with complex URL encoding techniques.

Between July and December 2024, they experimented with Base64 encoding but later dropped it. The attackers seem to focus more on access brokering than advanced malware development, possibly due to limited technical skill or strategic intent.

Security Recommendations

Experts advise organizations to monitor for suspicious network activity, especially connections to api.telegram.org using known bot tokens. Security teams should look for patterns in domain activity, particularly involving Notion and Glitch followed by Telegram API calls.

Organizations are also urged to create detection rules for unauthorized Telegram bot communication and pay special attention to attempts targeting Italy’s PEC system, as this may signal broader goals such as business email compromise or access brokering.

Advertisements

You may also like

blank

At ProxyServerPro, we are dedicated to providing cutting-edge proxy solutions tailored to meet the diverse needs of businesses and individuals. Our platform offers a comprehensive range of high-performance proxies, including residential, datacenter, and mobile options, ensuring seamless browsing, data scraping, and online anonymity. With a focus on reliability, speed, and security, we empower users to navigate the digital landscape with confidence. Whether you’re managing ad verification, market research, or web automation, ProxyServerPro is your trusted partner for scalable, efficient, and secure proxy services. Explore our portal to discover how we can elevate your online experience.

© 2024 Copyright  proxyserverpro.com