Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Select language
320x100 Itcentric
Banner Ransomfeed 970x120 1
Phishing Campaigns Exploit File Sharing Services

Phishing Campaigns Exploit File Sharing Services

23 December 2025 07:06

Researchers at Check Point, a pioneer and global leader in cybersecurity solutions, have discovered a phishing campaign in which attackers pose as file-sharing and electronic signature services to send financially-themed lures disguised as legitimate notifications.

The hyperconnected world has made it easier than ever for businesses and consumers to exchange documents, approve transactions, and complete critical financial workflows with a simple click. Digital file sharing and electronic signature platforms, widely used in banking, real estate, insurance, and everyday business operations, have become essential to the rapid functioning of modern organizations. This convenience also creates an opportunity for cybercriminals.

In this campaign, Check Point Harmony Email telemetry data shows that over 40,000 phishing emails targeting approximately 6,100 companies have been sent in recent weeks .

All malicious links were routed through the address https://url.za.m.mimecastprotect.com , increasing users’ trust by playing familiar redirect streams.

Mimecast’s secure link rewriting feature abuse,

Because Mimecast Protect is a trusted domain, this technique helps malicious URLs evade both automatic filters and user suspicion. To enhance credibility, the emails copied the service’s official images (Microsoft and Office product logos), used service-style headers , footers, and “Review Document” buttons, and spoofed display names such as ” X via SharePoint (Online),” “eSignDoc via Y,” and “SharePoint ,” which closely mimicked authentic notification templates.

Image 1: Example of a phishing email

In addition to the large SharePoint/e-signing campaign, researchers also identified a smaller but related operation that mimics DocuSign notifications . Like the main attack, this one impersonates a trusted SaaS platform and leverages legitimate redirection infrastructure, but the technique used to disguise the malicious target is significantly different.

In the main campaign, the secondary redirect acts as an open redirect, leaving the final phishing URL visible in the query string despite being wrapped in trusted services. In the DocuSign-themed variant, the link passes through a Bitdefender GravityZone URL and then through Intercom’s click-tracking service, with the real landing page completely hidden behind a tokenized redirect. This approach completely hides the final URL, making the DocuSign variant even more elusive and difficult to detect .

Image 2: Example of a phishing email from the DocuSign-style variant

The campaign primarily targeted organizations in the United States (34,057), Europe (4,525), Canada (767), Asia (346), Australia (267), and the Middle East (256), focusing particularly on the consulting , technology , and construction/real estate sectors, with additional victims in the healthcare , financial services , manufacturing , media and marketing , transportation and logistics , energy , education , retail , hospitality and travel , and government sectors. These sectors are attractive targets because they regularly exchange contracts, invoices, and other transactional documents, making file sharing and identity theft via electronic signatures highly convincing and more likely to be successful.

Why it’s important

Similar phishing campaigns have been reported in previous years, but what makes this attack unique is that it shows how easy it is for attackers to mimic trusted file-sharing services to trick users, and it highlights the need for ongoing awareness, especially when emails contain clickable links, suspicious sender details, or unusual content in the message body.

What organizations should do

Organizations and individuals must also take proactive measures to reduce risk. Some ways to protect yourself include:

  1. Always approach links embedded in emails with caution, especially when they seem unexpected or urgent.
  2. Pay close attention to email details, such as discrepancies between the display name and the actual sender address, formatting inconsistencies, unusual font sizes, low-quality logos or images, and anything that seems out of place.
  3. Hover your mouse over links before clicking to verify the actual destination and make sure it matches the service that supposedly sent the message.
  4. Open the service directly in your browser and search for the document directly, rather than using links provided in emails.
  5. Regularly educate employees and teams on emerging phishing techniques, so they understand what suspicious patterns look like.
  6. Use security solutions such as email threat detection, anti-phishing engines, URL filtering, and user reporting tools to strengthen your overall protection.

The attack campaign described by Check Point leveraged legitimate URL redirection services to hide malicious links, not a Mimecast vulnerability. The attackers abused trusted infrastructure, including Mimecast’s URL rewriting service, to disguise the true destination of the phishing URLs. This is a common tactic where criminals exploit any recognized domain to evade detection.

Mimecast customers are not susceptible to this type of attack ,” says a Mimecast representative.Mimecast’s detection engines identify and block these attacks. Our URL scanning capabilities automatically detect and block malicious URLs before delivery, and our URL rewriting service inspects links on click, providing an additional layer of protection that catches threats even when they’re hidden behind legitimate redirect chains. We continue to enhance our protections against evolving phishing techniques. Customers can view our 2024 analysis of similar campaigns at https://www.mimecast.com/threat-intelligence-hub/phishing-campaigns-using-re-written-links/ . We appreciate Check Point sharing their findings through responsible disclosure .”

Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.

  • #cybersecurity
  • cyber attacks
  • data protection
  • email security
  • file sharing
  • Malware
  • online threats
  • phishing
  • security awareness
  • threat intelligence
Immagine del sito
Redazione

The editorial team of Red Hot Cyber consists of a group of individuals and anonymous sources who actively collaborate to provide early information and news on cybersecurity and computing in general.