chat
expand_more

Widespread ‘Doc(s) Delivery’ Spear-Phishing Campaign Targets Enterprises

Threat researchers at Abnormal Security recently discovered a coordinated spear-phishing campaign targeting numerous enterprise organizations. The attackers compromised hundreds of legitimate accounts and are sending emails...
December 14, 2020

Threat researchers at Abnormal Security recently discovered a coordinated spear-phishing campaign targeting numerous enterprise organizations. The attackers compromised hundreds of legitimate accounts and are sending emails in rapid succession to organizations. The content of the emails originate from impersonated businesses such as eFax and include personalized ‘Doc Delivery’ notifications. The embedded URLs redirect to fake, never-before-seen Microsoft O365 phishing pages hosted on digital publishing sites like Joom, Weebly, and Quip–of which hundreds have been detected. When one email is detected and caught, the attackers appear to be running a script that changes the attack to a new impersonated sender and phishing link to continue the campaign.

The widespread use of hundreds of compromised accounts and never-before-seen URLs indicate that the campaign is designed to bypass traditional threat intelligence solutions accustomed to permitting known but compromised accounts into the inbox.

An Example Doc(s) Delivery Attack

As noted above, the attackers are impersonating businesses such as eFax and sending emails from a compromised account. This example is one of many similarly crafted campaigns that originate from multiple compromised accounts.


While it may seem counterintuitive on the attacker's part to send an eFax notification from an unrelated compromised account, it’s a clever tactic and problematic for the organization because compromise attacks will bypass traditional threat intelligence-based solutions. The reason the bypass works is because the compromised email addresses are known and trusted by the organization, based on prior and legitimate communications. As a result, they are also trusted by the SEG and delivered to the employees' inbox, despite containing numerous malicious signals including a well-disguised spear-phishing link.

Malicious Payload: If the “View Documents” link is clicked within the phishing email, it leads to a hosted Joom, Weebly, or Quip landing page where the employee is asked to click on another “View Documents” link. The attacker attempts to legitimize the campaign with official-looking landing pages similar to those used by eFax. If the employee clicks “View Documents” on the landing page, they are taken to a credential phishing page that attempts to steal their O365 credentials.

As noted above, the attackers are using more than one landing page template in an attempt to steal credentials.

Impact on Organization: The volume, recency, and spread of phishing attempts across numerous employees and organizations indicate that the attackers are determined in their efforts. Attacks are being detected and caught by Abnormal’s system on a near hourly basis across several organizations, shown in this example of an Abnormal Security Threat Log for an affected customer during Passive Mode. Because Abnormal is integrated passively, there is not currently auto-remediation of malicious threats.


To further complicate issues for the employees and organization, many recipients are forwarding the phishing attempts to their personal email addresses in order to open them through personal accounts.

How Abnormal Stops These Attacks

Abnormal Security automatically detects and remediates attacks such as these using a combination of Identity and Content analysis.

First, the attack was flagged by our system for having an Unusual Sender, as Abnormal learns the commonly used email addresses for internal and external communications. The attack was flagged because we have never seen this particular email address sending messages to or communicating with anyone in the targeted organization

The attack was flagged for containing a suspicious link, as Abnormal extracts direct links from email content, as well as redirected links from embedded links, cloud-sharing documents, and attachments. Finally, the attack was flagged due to the text content classification, used to flag conversations related to the theft of personal information, financial details, invoices, and more.

If your organization has experienced similar phishing campaigns and is interested in how Abnormal Security can protect your employees, request a demo to learn more.

Widespread ‘Doc(s) Delivery’ Spear-Phishing Campaign Targets Enterprises

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Get AI Protection for Your Human Interactions

Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo

Related Posts

B Convergence S3 Recap Blog
That’s a wrap on Season 3! Explore a few of the biggest takeaways from chapters 7-9 and learn how to watch all three sessions on demand.
Read More
B CSAM SOC
Explore key insights from the SOC Unlocked podcast on enhancing cybersecurity awareness and training. Learn how offensive tactics, insider threats, AI, and cloud security shape effective defense strategies.
Read More
B F500 Packaging Solutions Provider Proofpoint Replacement Blog
A Fortune 500 packaging leader boosted threat detection 20x and saved 6,500+ hours annually by replacing its Proofpoint SEG with Abnormal’s AI-powered solution.
Read More
B E Rate
Discover how AI-powered email protection ensures a secure digital learning environment.
Read More
B Healthcare Industry Attack Trends Blog
Targeted attacks on the healthcare industry are on the rise. Explore the latest threat trends and learn how to protect your organization.
Read More
B URL
Explore how attackers exploit rewritten URLs to gain unauthorized access, highlighting traditional security vulnerabilities and the need for modern tools.
Read More