"Moving to E5 has been really good from a security point of view... Now we can get a holistic view of whatโs going on, which helps us to make changes and recommendations for future plans."
IT Service Manager
Ian Harkess
Trusted by industry leaders
Kickstart Your FastTrack Journey
Fill out the short form below to express your interest in our FastTrack programme, and weโll be in touch soon.
Please note: A minimum of 150 enterprise licenses is required for FastTrack eligibility.
โWe needed to find solutions to a variety of issues whilst being a complex business, operating in a 24/7 environment. Stripe OLT listened and understood immediately the challenges we faced.โ
IT Operations Manager
Simon Darley
Trusted by industry leaders
Let's Talk
Call us on one of the numbers below, we cover the whole of the UK, so call the nearest office.
โWe needed to find solutions to a variety of issues whilst being a complex business, operating in a 24/7 environment. Stripe OLT listened and understood immediately the challenges we faced.โ
In this Expert Intel, our Principal Security Analyst, breaks down how a new spearphishing campaign operates - and the practical steps organisations must take to recognise, resist, and respond to these types of attack.
Emails observed feature anti-detection techniques such as hidden characters and high-reputation external links, as well as single use phishing URLs that self-destruct once accessed.
The Stripe OLT SOC has identified a sophisticated Spearphishing campaign targeting senior employees, particularly those in C-Suite and leadership positions.
Actors behind this campaign are leveraging tailored emails that impersonate internal HR communications, via a shared document in OneDrive, to trick recipients into entering corporate credentials.
Key Details
Targets: Executives and senior leadership across multiple industries
Email Content: Subject lines reference โSalary amendmentโ or โFIN_SALARYโ and pose as OneDrive document-sharing notifications.
Credential Theft Page: The link leads to a convincing Microsoft Office/OneDrive login page, which harvests credentials. Both the email body and phishing page are customised with the recipientโs name and company details to enhance credibility.
Delivery Method: Emails are sent via Amazon Simple Email Service (SES) infrastructure. The actor is rotating between many sending domains and subdomains to evade detection. To date, approximately 80 domains have been identified as part of this campaign.
Campaign Tactics: We have observed the actor โwarming upโ inboxes by sending an initial benign email days before the phishing attempt. Emails observed feature anti-detection techniques such as hidden characters and high-reputation external links, as well as single use phishing URLs that self-destruct once accessed.
Figure 1: Example Email Body Content
Figure 2: Example Credential Phishing Page
Technical Details
Our analysis of campaign infrastructure shows that the actor is leveraging multiple providers across delivery, registration, DNS, and hosting. Specifically:
Amazon SES โ used for email delivery.
Cloudflare โ observed as a frequent DNS/nameserver provider for related domains.
Akamai Cloud (formerly Linode) โ identified as a hosting provider for phishing infrastructure.
Mat Bao Corporation โ the most common registrar, with the majority of domains registered here.
Web Commerce Communications Limited (WebNic.cc) โ additional registrar observed.
We have also observed the actor behind this campaign using obfuscated button text to bypass detection methods. When the initial email is viewed in Light Mode, the buttons appear as โOpenโ and โShareโ.
In Dark Mode, concealed padding becomes visible, exposing randomised alphanumeric strings such as twPOpenHuxv and gQShareojxYI. This breaks up high value trigger words like โOpenโ and โShare,โ reducing the likelihood of detection by secure email gateways that apply string or regex based rules.
Figure 3: Example Email Body Content, Light Mode
Figure 4: Example Email Body Content, Dark Mode
Recommended Actions
To reduce exposure and strengthen resilience internally to threats like this, organisations should take the following steps – these arenโt optional safeguards, theyโre the essentials:
Awareness for executives and assistants โ Ensure that those most likely to be targeted understand this campaign. The actor is using realistic โsalary amendmentโ subject lines and personalised company details to increase credibility.
Scepticism around unexpected documents โ Remind staff to be cautious when receiving links or documents relating to HR, payroll, or salary matters, particularly when sent externally.
Reporting suspicious emails โ Make it clear how to escalate suspicious messages quickly within your business. The faster these are reported to your security resource, the quicker they can take action to protect others.
Support staff training โ Executive assistants and close colleagues are also high-value targets. Ensure they receive the same level of awareness training and support as C-suite members.
For Security & IT TeaMs
While awareness is the first line of defence, this campaign is sophisticated enough that relying solely on end-user caution is not enough. Security and IT teams should proactively hunt for IOCs and check whether their organisation has already been targeted.
Our SOC analysts recommend starting with targeted hunting queries and blocking domains linked to this campaign.
Sentinel Hunting Query
Run the following KQL query in Sentinel to detect emails that match the observed subject lines:
EmailEvents
| where Subject contains "FIN_SALARY"
| where EmailDirection == "Inbound"
| project Timestamp, RecipientEmailAddress, SenderMailFromDomain, Subject, ConfidenceLevel, NetworkMessageId, EmailAction
Indicators of Compromise (IOCs)
The following is a list of domains have been used for email sending:
Spearphishing is evolving, and adversaries are investing in more targeted, evasive tactics.
If youโd like support in strengthening your detection and response capabilities, book a free discovery session with our team. Weโll help you assess where you stand, and help you understand how to get ahead.
This website uses cookies. By using this site you agree to our use of cookies. We use cookies to enhance your experience. To understand the specific cookies we use and how we handle your data, see out Cookie Policy, Privacy Policy and Terms & Conditions. Manage your preferences at any time by clicking the 'View Preferences' button.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.