WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Threat Awareness – Microsoft Warns of Increased BEC Attack Tactics via File Hosting Services
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Threat Awareness – Microsoft Warns of Increased BEC Attack Tactics via File Hosting Services

Author: Chase Snow

Created: Thursday, October 10, 2024 - 13:26

Categories: Cybersecurity, Security Preparedness

Microsoft has recently observed more attack campaigns misusing file hosting services and which are increasingly using defense evasion tactics involving files with restricted access and view-only restrictions. They issued a warning in their threat intelligence blog on Tuesday, explaining that these attacks are intended to compromise identities and devices, and usually lead to further business email compromise (BEC) attacks. The widespread use of file hosting services, such as SharePoint, OneDrive, and Dropbox makes them attractive targets for threat actors. While these campaigns are generic and opportunistic in nature, they involve sophisticated techniques to perform social engineering, evade detection, and move laterally across endpoints.

WaterISAC is aware of at least one utility that reported an Attacker in the Middle (AiTM) attack, also known as Man in the Middle attack (MITM), in the Quarterly Incident Survey which follows this similar pattern of attack. It is included in the Q2 WaterISAC Quarterly Incident Report that was published today.

Members are encouraged to review Microsoft’s blog post which includes an attack overview and Recommended actions sections useful for identifying and defending against this threat. Members are also encouraged to regularly remind users about current threat campaigns that mimic legitimate services and what to watch out for when these messages land in their inboxes. For more information and additional analysis, visit The Hacker News.

WaterISAC Resources:

  • Cyber Resilience – Don’t Get Hooked, Phishing Can Still Bypass MFA | August 2024
  • EPA Office of Inspector General Issues BEC Fraud Alert | February 2024
  • Security Awareness – Another Phishing Campaign Leveraging Dropbox | March 2024
  • Security Awareness – A Must Read if your Utility Uses Email and Pays Invoices: BEC with a New Twist | August 2023

Additional Resource:

  • Business Email Compromise: What It Is and How to Prevent It  | National Cybersecurity Alliance

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated April 30, 2026)

Apr 30, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

Tip of the Week – April 30, 2026

Apr 30, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) Cyber Readiness Institute Joins WaterISAC as a Community Partner to Strengthen Cyber Readiness Across the Water Sector

Apr 30, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar