Fake Word Online ➡️ Remote Access: Detection Blind Spots in Action
A phishing attack starting from an Outlook email redirects victims to a fake Word Online / OneDrive page, leading to stealthy remote access under the guise of a document preview.
Instead of traditional malware loaders, the chain relies on legitimate tools to establish remote access while blending into normal corporate activity. This reduces visibility for traditional detection and increases the risk of delayed detection and prolonged attacker presence.
In ANYRUN Sandbox, analysts can observe high-value detection signals early in the execution chain, including suspicious document-delivery domains, silent software installation behavior, intermediate deployment stages, and utilities used to hide installed programs.
These artifacts help teams build detections around trusted-tool abuse, suspicious command-line behavior, and phishing infrastructure instead of relying only on file hashes.
Execution chain:
Outlook .eml ➡️ Word Online phishing page ➡️ MSI installer ➡️ Ninite /silent execution ➡️ Remote access via ScreenConnect ➡️ Activity concealment via HideUL
See the full attack flow and collect IOCs to improve detection coverage.
Explore related activity and validate hunting patterns using this TI Lookup query: filePath:".eml" AND threatName:"phishing" AND (threatName:"^rat$" OR threatName:"^rmm-tool$")