chat
expand_more

Widespread ‘Doc(s) Delivery’ Spear-Phishing Campaign Targets Enterprises

Threat researchers at Abnormal Security recently discovered a coordinated spear-phishing campaign targeting numerous enterprise organizations. The attackers compromised hundreds of legitimate accounts and are sending emails...
December 14, 2020

Threat researchers at Abnormal Security recently discovered a coordinated spear-phishing campaign targeting numerous enterprise organizations. The attackers compromised hundreds of legitimate accounts and are sending emails in rapid succession to organizations. The content of the emails originate from impersonated businesses such as eFax and include personalized ‘Doc Delivery’ notifications. The embedded URLs redirect to fake, never-before-seen Microsoft O365 phishing pages hosted on digital publishing sites like Joom, Weebly, and Quip–of which hundreds have been detected. When one email is detected and caught, the attackers appear to be running a script that changes the attack to a new impersonated sender and phishing link to continue the campaign.

The widespread use of hundreds of compromised accounts and never-before-seen URLs indicate that the campaign is designed to bypass traditional threat intelligence solutions accustomed to permitting known but compromised accounts into the inbox.

An Example Doc(s) Delivery Attack

As noted above, the attackers are impersonating businesses such as eFax and sending emails from a compromised account. This example is one of many similarly crafted campaigns that originate from multiple compromised accounts.


While it may seem counterintuitive on the attacker's part to send an eFax notification from an unrelated compromised account, it’s a clever tactic and problematic for the organization because compromise attacks will bypass traditional threat intelligence-based solutions. The reason the bypass works is because the compromised email addresses are known and trusted by the organization, based on prior and legitimate communications. As a result, they are also trusted by the SEG and delivered to the employees' inbox, despite containing numerous malicious signals including a well-disguised spear-phishing link.

Malicious Payload: If the “View Documents” link is clicked within the phishing email, it leads to a hosted Joom, Weebly, or Quip landing page where the employee is asked to click on another “View Documents” link. The attacker attempts to legitimize the campaign with official-looking landing pages similar to those used by eFax. If the employee clicks “View Documents” on the landing page, they are taken to a credential phishing page that attempts to steal their O365 credentials.

As noted above, the attackers are using more than one landing page template in an attempt to steal credentials.

Impact on Organization: The volume, recency, and spread of phishing attempts across numerous employees and organizations indicate that the attackers are determined in their efforts. Attacks are being detected and caught by Abnormal’s system on a near hourly basis across several organizations, shown in this example of an Abnormal Security Threat Log for an affected customer during Passive Mode. Because Abnormal is integrated passively, there is not currently auto-remediation of malicious threats.


To further complicate issues for the employees and organization, many recipients are forwarding the phishing attempts to their personal email addresses in order to open them through personal accounts.

How Abnormal Stops These Attacks

Abnormal Security automatically detects and remediates attacks such as these using a combination of Identity and Content analysis.

First, the attack was flagged by our system for having an Unusual Sender, as Abnormal learns the commonly used email addresses for internal and external communications. The attack was flagged because we have never seen this particular email address sending messages to or communicating with anyone in the targeted organization

The attack was flagged for containing a suspicious link, as Abnormal extracts direct links from email content, as well as redirected links from embedded links, cloud-sharing documents, and attachments. Finally, the attack was flagged due to the text content classification, used to flag conversations related to the theft of personal information, financial details, invoices, and more.

If your organization has experienced similar phishing campaigns and is interested in how Abnormal Security can protect your employees, request a demo to learn more.

Widespread ‘Doc(s) Delivery’ Spear-Phishing Campaign Targets Enterprises

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Get AI Protection for Your Human Interactions

Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo

Related Posts

B Dropbox Open Enrollment Attack Blog
Discover how Dropbox was exploited in a sophisticated phishing attack that leveraged AiTM tactics to steal credentials during the open enrollment period.
Read More
B AISOC
Discover how AI is transforming security operation centers by reducing noise, enhancing clarity, and empowering analysts with enriched data for faster threat detection and response.
Read More
B Microsoft Blog
Explore the latest cybersecurity insights from Microsoft’s 2024 Digital Defense Report. Discover next-gen security strategies, AI-driven defenses, and critical approaches to counter evolving threats and safeguard your organization.
Read More
B Osterman Blog
Explore five key insights from Osterman Research on how AI-driven tools are revolutionizing defensive cybersecurity by enhancing threat detection, boosting security team efficiency, and countering sophisticated cyberattacks.
Read More
B AI Native Vendors
Explore how AI-native security like Abnormal fights back against AI-powered cyberattacks, protecting your organization from human-targeted threats.
Read More
B 2024 ISC2 Cybersecurity Workforce Study Recap
Explore key findings from the 2024 ISC2 Cybersecurity Workforce Study and find out how SOC teams can adapt and thrive amidst modern challenges.
Read More