Real case: Industrial sector company victim of OneDrive B2B phishing (client name omitted for confidentiality)
Key points
| Date/Phase | Event |
|---|---|
| Day 1 - First contact | Attacker (“Cizmesija” from Croatia) sends a well-written email requesting a catalogue and pricing. Builds trust using professional industry language. |
| Day 1 - Legitimate response | Sales team responds with interest, providing information and requesting additional details to customize the offer. |
| Day 2 - Hook delivery | Attacker responds with an apparently OneDrive link: visible text shows “onedrive.live.com” but the actual link points to “onedrive-rusty-craves.surge.sh”. |
| Fake page | Fraudulent domain redirects to an interface that simulates OneDrive with fake documents (Purchase.pdf, Specification.xlsx, Drawings_sketches.png, Presentation.mov). |
| Credential capture | Clicking on any document displays a modal requesting corporate credentials with email pre-filled (URL “e” parameter). |
| Potential compromise | If the victim enters credentials, the attacker gains access to corporate accounts (email, real OneDrive, SharePoint, Teams, etc.). |
In recent weeks we have detected an increase in phishing campaigns (B2B attacks), using fake OneDrive links as the initial vector. In this article we document a real case that affected a company in the industrial sector, in order to help other organizations identify and block this type of threat.
Attack flow
Step 1: First contact - commercial interest email
The attacker presents as Cizmesija, supposedly from Croatia, requesting a catalogue and pricing for products. The message is well-written and adapted to the sector, which builds trust:
Hello,
This is Čižmešija from Croatia,
We kindly request your best pricing and Catalogue for your products.
We also want to know if you can deliver to Croatia Rijeka, for this information is crucial for us before we send our PO.
Thank you for considering our inquiries. We eagerly await your prompt response.
Kind regards
Ž. Čižmešija
Mac Globals Inc
+385 91 224 7000
Svilarska 20; Emera d.o.o.,
48000 Koprivnica, Croatia.
Email= info@macglobals.com
Email= Info.macglobals@gmail.com
Objective: Gain the trust of the sales team so that the conversation continues.
Step 2: Legitimate response from the victim
The sales team of the industrial company, interested in the potential sale, responds with a proposal and additional questions to customize the offer.
Step 3: Delivery of the malicious link
The attacker responds quickly, this time including an apparently legitimate link to OneDrive:
https://onedrive.live.com/PO/en-us/cloudstoragefiles/fileaccess/Macglobal/
However, this text masks the actual link:
https://onedrive-rusty-craves.surge.sh/index.html?e=email@victim.xx
This domain redirects to a fraudulent page that simulates the OneDrive interface and requests corporate credentials.
Step 4: Elements that reveal the fraud
Example of the shared malicious resource
In the detected campaign, the link simulated a shared OneDrive folder with documents such as:
Clicking on any of these items displayed a pop-up modal requesting user credentials, with the email field pre-filled (URL “e” parameter).
How our Adversary-Aware SOC would have prevented this attack
Our Adversary-Aware SOC is designed to identify and neutralize sophisticated B2B phishing campaigns like this one:
| Merabytes Defense Area | How our SOC would have acted | Result obtained |
|---|---|---|
| Email link analysis (URL rewriting and sandboxing) | Detection of discrepancy between visible link text and actual URL. The link points to “surge.sh” instead of the official OneDrive domain. | Automatic blocking of the email before reaching the inbox. |
| Identity protection (Cisco Duo 2FA) | Even if credentials are stolen, access to corporate services requires a second authentication factor. | Stolen credentials are useless without 2FA. |
| Email behavior monitoring | Detection of suspicious pattern: initial commercial contact quickly followed by an external link for download. | Early alert to the security team before compromise. |
| Suspicious domain filtering | Automatic blocking of generic hosting domains (surge.sh, netlify.app, etc.) used in phishing campaigns. | Prevention of access to credential capture pages. |
| B2B phishing pattern analysis | Detection of social engineering techniques: trust building + commercial urgency + external link. | Campaign identification before multiple victims. |
| Continuous training and simulations | Regular training on B2B phishing with real examples of targeted attacks against the sector. | Alert users who verify links before clicking. |
Thanks to the adversary-focused mindset, our SOC understands B2B social engineering tactics and does not rely solely on technical indicators, but analyzes the complete communication context to identify sophisticated phishing attempts.
Lessons learned
Conclusion
This attack was successful in multiple companies because there was no email behavioral analysis or identity protection with 2FA. With Merabytes, the story would have ended differently:
Additional recommended measures
This attack is an example of spear phishing that exploits B2B social engineering to overcome usual defenses.
If you want to protect your company from this type of threat before it reaches the inbox, visit merabytes.com and request access to our advanced email filtering and analysis service + identity protection with 2FA. We block phishing campaigns, malware, and identity spoofing even before they are visible to users, drastically reducing the risk of compromise.
An Adversary-Aware SOC goes beyond traditional security monitoring by understanding attacker tactics, techniques, and procedures (TTPs). We proactively hunt for threats using MITRE ATT&CK framework, behavioral analysis, and threat intelligence to detect attacks that bypass conventional security controls.
Traditional security tools focus on known signatures and indicators. Our behavioral detection analyzes anomalies in user activity, email patterns, network traffic, and system behavior to identify sophisticated attacks that use legitimate tools or bypass authentication controls. This caught the attacks in these case studies before significant damage occurred.
Our SOC operates 24/7 with real-time monitoring and automated response capabilities. Critical alerts trigger immediate investigation and containment actions within minutes. We provide continuous threat hunting, forensic analysis, and coordinated incident response to minimize impact and prevent lateral movement.
We combine global threat intelligence feeds with our own research from real incidents. Every attack we analyze contributes to our detection rules and IOC database, which is immediately shared across all protected environments. This means if we see a new attack pattern targeting one client, all clients are automatically protected within hours.
Absolutely. Our SOC integrates with your existing EDR, XDR, SIEM, firewalls, email security, and identity protection tools. We enhance their effectiveness by correlating events across all sources, applying adversary-aware detection logic, and providing expert human analysis that automated tools alone cannot achieve.