CyberSecurityNews

BlobPhish Attack Steals Microsoft 365 Credentials


A sophisticated, memory-resident phishing campaign called BlobPhish, active since October 2024, that exploits browser Blob URL APIs to silently steal credentials from Microsoft 365 users, major U.S. banks, and financial platforms while remaining almost completely invisible to traditional security tools.

BlobPhish is a sustained credential-phishing operation that fundamentally changes how phishing pages are delivered to victims.

Rather than hosting fake login pages on attacker-controlled servers and serving them over standard HTTP, BlobPhish generates phishing pages entirely inside the victim’s browser using JavaScript Blob objects.

The result is a phishing payload that exists only in memory, leaving no file on disk, no cache artifact, and no suspicious HTTP request in proxy logs for security tools to flag.

Close the gap before it becomes business risk. Give your SOC full visibility into suspicious activity.

Blobphish attack detonated in the sandbox 

First observed in October 2024, the campaign has run uninterrupted for over 18 months and recorded a significant spike in activity in February 2026, confirming it as a mature, well-maintained threat operation rather than a short-lived opportunistic attack.

Accelerate investigations and stop incidents earlier. Leverage threat intelligence to improve threat visibility.

BlobPhish kill chain

The BlobPhish kill chain is elegantly designed to defeat both network-based and file-based defenses:

Code responsible for blob object download 
Code responsible for blob object download
Data exfiltration patterns

BlobPhish Evades Conventional Defenses

BlobPhish impersonates a broad list of high-value platforms, including Microsoft 365, OneDrive, SharePoint, Chase, Capital One, FDIC, E*TRADE, Charles Schwab, Morgan Stanley/Merrill Lynch, American Express, PayPal, and Intuit.

Phishing form imitating Chase Banking login page

Although financial and cloud-productivity lures dominate, victim organizations span Finance, Manufacturing, Education, Government, Transport, and Telecommunications sectors.

Geographically, approximately one-third of observed victims are U.S.-based, with additional activity recorded across Germany, Poland, Spain, Switzerland, the UK, Australia, South Korea, Saudi Arabia, Qatar, Jordan, India, and Pakistan.

The blob:https:// scheme is the campaign’s core evasion innovation. Because the phishing page is never transmitted over the network as a standalone HTTP response:

A single successful BlobPhish compromise can cascade into Business Email Compromise (BEC) fraud, full Microsoft 365 tenant takeover, unauthorized wire transfers, investment account manipulation, and ransomware deployment following lateral movement.

Regulatory consequences, including GDPR 72-hour breach notification, SEC cybersecurity incident disclosure, and FFIEC authentication guidance, add material legal exposure on top of operational damage.

Key Indicators of Compromise (IOCs)

IOC TypeExample
Loader URLhxxps[://]mtl-logistics[.]com/blb/blob[.]html
Exfiltration endpointhxxps[://]mtl-logistics[.]com/css/sharethepoint/point/res[.]php
Capital One exfilhxxps[://]wajah4dslot[.]com/wp-includes/certificates/tmp//res[.]php
Chase Banking exfilhxxps[://]hnint[.]net/cgi-bin/peacemind//res[.]php
E*TRADE exfilhxxps[://]ftpbd[.]net/wp-content/plugins/cgi-/trade/trade//res[.]php
tele.php varianthxxps[://]_wildcard_[.]gonzalezlawnandlandscaping[.]com/…/tele[.]php

Additional compromised domains include larva888[.]comriobeautybrazil[.]comi-seotools[.]com, and mts-egy[.]net.

Defensive Recommendations

Security teams should take the following priority actions:

BlobPhish demonstrates that the phishing threat has outpaced perimeter and static-signature defenses.

Effective protection now demands dynamic behavioral analysis, continuous threat hunting, and automated intelligence propagation operating at the speed of attacker infrastructure rotation.

Prevent high-stakes credential attacks with enterprise-grade intelligence. Reduce risk, not just response time.



Source link