In early 2025, Nimblr’s Cyber Intelligence team uncovered a highly targeted phishing attack aimed at a major Swedish sporting event. The attack was designed to bypass traditional email defenses and exploit user trust by abusing legitimate platforms. Here’s how our honeypot system identified, traced, and responded to the threat—before it could spread further.
Unlike attacks that target infrastructure or exploit zero-day vulnerabilities, this campaign focused entirely on the end user. The attacker’s goal was to steal Microsoft 365 credentials by crafting a chain of convincing but deceptive steps.
Thanks to one of Nimblr’s deployed honeypots, a decoy email address embedded in a realistic but fake corporate website, our team captured the phishing email in real time.
Step 1: Delivery via legitimate infrastructure
The phishing email was sent from a legitimate, compromised Microsoft Exchange account belonging to the CEO of the event organizer. Because the email originated from a trusted source, it bypassed most spam filters and security checks.
Step 2: Deceptive content and timing
The email included a message referencing a “project proposal” and linked to a document hosted on Microsoft OneDrive. Notably, the message was timed just days before the start of the sports event, leveraging urgency and relevance to increase click-through rates.
Step 3: Use of a trusted platform as a first layer
The initial OneDrive link led to a genuine Microsoft-hosted page, further reinforcing the legitimacy of the email. This page contained a document with a second embedded link.
Step 4: Payload delivery via indirect link
Only upon clicking the secondary link did the actual malicious content appear: a fake Microsoft login page designed to harvest credentials. The page mimicked Microsoft’s branding and behavior, with the only clue being a non-Microsoft URL—something most users would miss.
After detecting the email, Nimblr’s team initiated a structured threat analysis:
Despite immediate outreach, the malicious OneDrive document remained online for six days, illustrating the need for faster response coordination between organizations and IT vendors.
This attack highlights a growing trend: the abuse of legitimate platforms like OneDrive, Exchange, and SharePoint to deliver multi-stage payloads that evade perimeter defenses. The initial payload appeared completely benign, and only deeper in the attack chain did malicious behavior emerge.
Want to understand how Nimblr’s Cyber Intelligence and honeypot systems can protect your organization from evolving user-targeted threats?
Contact us today or explore our Security Awareness Training platform to learn more.