On this page:
Attack Spotlight
July 2, 2025
Credential phishing attack using both Zoom Events and Zoom Docs to deliver a AITM credential phishing payload
Sublime’s Attack Spotlight series is designed to keep you informed of the email threat landscape by showing you real, in-the-wild attack samples, describing adversary tactics and techniques, and explaining how they’re detected. These attacks can be prevented with a free Sublime account.
EMAIL PROVIDER: Microsoft 365
ATTACK TYPE: Credential Phishing
Over the past few weeks, we’ve seen an increase in the abuse of Zoom for attack delivery. While Zoom bombing was popular a few years back, the expansion of the Zoom platform has given bad actors more tools to abuse. In a recent attack, we saw an attack that used both Zoom Events and Zoom Docs to deliver a AITM credential phishing payload.
(h/t to Recon InfoSec for sharing this sample. Read their blog on Zoom Events phishing.)
This particular attack started with a Zoom Events file upload notification delivered from a valid Zoom address (Zoom Upload <noreply-zoomevents@zoom[.]us>)
.
If the target clicks Open Attachment, they are taken to a legitimate Zoom Doc at docs.zoom[.]us
. This page impersonates a Microsoft Office 365 portal, featuring icons for the most popular tools in the suite. Below the icons is an Open Shared File link that, upon hover over, leads to an office.regencyoutdor[.]com
address. The subdomain aligns with imagery on the Zoom Doc page, but the URL is malicious (and features a typo).
The link takes the target to an adversary in the middle (AITM) phishing page replicating a Microsoft login page. A valid Microsoft login page will start with login.microsoft[.]com
, this one does not.
At this point, if a user enters credentials, they will be stolen. The page makes every effort to make this process appear legitimate, including responding with login failures for incorrect credentials.
Sublime's AI-powered detection engine prevented this attack. Some of the top signals for this attack were:
ASA, Sublime’s Autonomous Security Analyst, flagged this email as malicious. Here is ASA’s analysis summary:
Living off Trusted Sites (LOTS) attacks are popular because they let bad actors hide behind friendly domains. That’s why the most effective email security platforms are adaptive, using AI and machine learning to shine a spotlight on seemingly minor discrepancies.
If you enjoyed this Attack Spotlight, be sure to check our blog every week for new blogs, subscribe to our RSS feed, or sign up for our monthly newsletter. Our newsletter covers the latest blogs, detections, product updates, and more.
Read more Attack Spotlights:
Sublime releases, detections, blogs, events, and more directly to your inbox.
The latest research, attack spotlights, and product updates.
Experience Sublime’s adaptable email security platform and take control of your email environment today.