Hackers Imitate OneNote Login to Steal Office365 & Outlook Credentials

Hackers Imitate OneNote Login to Steal Office365 & Outlook Credentials

A sophisticated phishing campaign targeting Italian and U.S. users through fake Microsoft OneNote login prompts designed to harvest Office 365 and Outlook credentials. 

The attack leverages legitimate cloud services and Telegram bots for data exfiltration, making detection significantly more challenging for traditional security measures.

Phishing Campaign Targets Italian Users

The phishing operation begins with attackers hosting malicious pages on trusted platforms, including Notion workspaces, Glitch domains, Google Docs, and RenderForest services. 

Google News

Victims receive emails with subject lines like “New Document Shared with you,” directing them to fake OneNote pages that appear legitimate. 

Hackers Imitate OneNote Login to Steal Office365 & Outlook Credentials
Fake OneNote login page 

The malicious pages present multiple authentication options, including Office365, Outlook, Rackspace, Aruba Mail, PEC, and other email services.

Celebrate ANY.RUN’s Birthday – Get extra licenses free with our interactive sandbox until May 31 – Try Here

According to ANY.RUN report, the campaign specifically targets Italian users and organizations, with phishing content written in Italian and subdomain names containing Italian words. 

Hackers Imitate OneNote Login to Steal Office365 & Outlook Credentials
Phishing login page

The attack has been active since at least January 2022, demonstrating remarkable persistence and evolution over time.

The phishing pages employ sophisticated JavaScript code to capture victim credentials and IP addresses. The malware uses the ipify.org service to retrieve victims’ IP addresses through the following code implementation:

Hackers Imitate OneNote Login to Steal Office365 & Outlook Credentials

After credential collection, the stolen data is exfiltrated via Telegram bots using hardcoded bot tokens and chat IDs directly embedded in the phishing script. The exfiltration mechanism constructs requests to Telegram’s API endpoint:

Hackers Imitate OneNote Login to Steal Office365 & Outlook Credentials

Researchers identified multiple bot configurations throughout the campaign’s timeline, including bots named “Sultanna” (@Sultannanewbot), “remaxx24” (@remaxx24bot), and “Resultant” (@Resultantnewbot). 

Hackers Imitate OneNote Login to Steal Office365 & Outlook Credentials
Intercepted messages from the remaxx24 bot

The attack maintains persistence by redirecting victims to legitimate Microsoft OneNote login pages after credential theft, creating an illusion of legitimacy.

Evasion Techniques and Evolution

The campaign demonstrates significant technical evolution over its operational lifetime. Early variants used URL encoding obfuscation and web form submissions for data exfiltration. 

Starting February 2022, attackers transitioned to Telegram bot-based exfiltration with nested URL encoding (2-4 levels deep).

Between July and December 2024, the threat actors experimented with Base64 obfuscation but subsequently abandoned this technique for unknown reasons. 

The attackers deliberately avoid sophisticated evasion methods, suggesting either limited technical expertise or strategic focus on access brokering rather than payload development.

Security experts recommend monitoring network traffic for suspicious Telegram API communications, specifically requests to api.telegram.org containing the identified bot tokens. 

Organizations should implement behavioral pattern detection for domain chains following the “Notion → Glitch → Telegram API” structure and establish signature-based rules identifying unauthorized Telegram bot activity within corporate networks.

The campaign’s targeting of PEC (Posta Elettronica Certificata), Italy’s national certified email system, indicates potential objectives extending beyond simple credential theft to business email compromise and access brokering within cybercriminal ecosystems.

4 days left to level up your SOC. Get sandbox licenses for faster Threat Detection


Source link