New O365 Phishing Campaign Leverages AES and Malicious npm Packages to Capture User Credentials

Fortra’s Suspicious Email Analysis (SEA) team uncovered a highly sophisticated phishing campaign targeting Microsoft O365 users, marking a significant escalation in the technical complexity of credential harvesting threats.

While phishing attacks are a persistent issue, this campaign distinguishes itself by creatively leveraging multiple modern technologies in tandem including Advanced Encryption Standard (AES) encryption, malicious npm (Node Package Manager) packages, and abuse of reputable Content Delivery Networks (CDNs).

This coordinated use of advanced obfuscation, supply chain compromise, and cloud-native redirection mechanisms highlights a new evolution in attack strategies against enterprise users.

The campaign initiates with a phishing email carrying a benign-looking .htm attachment, “EFT-PMT.htm.”

Malicious npm Packages
malicious “.htm” file

Upon inspection, investigators found that the file concealed its payload using AES encryption an unusual step in phishing kits, where simpler JavaScript obfuscation is the norm.

The encrypted string, when decrypted, revealed a JavaScript file hosted on jsDelivr a widely used CDN for distributing open-source npm packages.

This hosting choice not only lends legitimacy to the attack but also increases the difficulty of detection and remediation.

The referenced JavaScript file belonged to the npm package [email protected], masquerading as a legitimate software library accessible via standard CDN pathways (https://cdn.jsdelivr.net/npm/[email protected]/MOMENTUM/NOW.API.JS).

Post-execution, this script dynamically constructs phishing links personalized with the victim’s email address, redirecting users into a carefully crafted Office 365 login mimic. Credentials entered here are harvested by the adversaries.

Exploiting Development Infrastructure

npm is a cornerstone of JavaScript ecosystem, allowing rapid code reuse by developers.

Malicious actors have long exploited open-source repositories for malware distribution and supply chain attacks, but leveraging them as infrastructure to serve live phishing payloads introduces new risks.

CDNs like jsDelivr further amplify this risk, as their global distribution and trusted reputation can thwart security controls and lend legitimacy to malicious assets.

According to the Report, Fortra’s analysis traced the payloads through both live CDN links and downloaded npm packages.

Even after CDN takedowns, the malicious packages could be installed locally via npm install [email protected], opening the “MOMENTUM” directory and the critical NOW.API.JS script.

This script not only facilitated redirection but embedded technical artifacts (e.g., the victim’s email) directly into the attack flow, increasing the effectiveness of credential harvesting.

O365 Phish Pages

A defining characteristic of this campaign is the use of chained, multi-stage redirection.

Malicious URLs embedded in the JavaScript payload (such as those under natrium100gram.site and various pages.dev domains) were confirmed to host or point toward active phishing infrastructure, ultimately leading to fake Office 365 login portals indistinguishable from legitimate authentication pages.

Cloudflare and other infrastructure providers have responded by blocking known malicious endpoints, but attackers have adapted with new package versions (e.g., [email protected]) and fresh phishing URLs.

Malicious npm Packages
package.json file

Malware sandboxes like Any.Run captured the final phishing sites before takedown, demonstrating the adversaries’ intent: harvesting enterprise credentials at scale using dynamic, infrastructure-as-code principles.

This campaign underscores an alarming trend: attackers are integrating advanced cryptography, supply chain infiltration, and cloud-native delivery into phishing operations.

By chaining together AES-encrypted payloads, npm-based code execution, and trusted CDNs, adversaries can evade detection and rapidly adapt to countermeasures.

Organizations must escalate their security posture, including continuous monitoring of developer dependencies, defense against encrypted payloads, and vigilant tracking of redirection patterns in emails and cloud services.

As attacker sophistication accelerates, defenders should expect further convergence of supply chain compromise and phishing, necessitating robust, contextual threat intelligence.

IOCs Table

IndicatorTypeDescription / Notes
5d33bd347d0525731c375048f8cb228cb6ab54bbf883fbc9a862e457a4137653SHA256EFT-PMT.htm malicious attachment
hxxps://cdn.jsdelivr.net/npm/[email protected]/MOMENTUM/NOW.API.JSURLMalicious npm package payload hosted on jsDelivr CDN
hxxps://natrium100gram.site/public/api/page/redirectURLRedirection endpoint for further phishing
hxxps://adobe-pending-sign-7834892393293.pages.dev/#?refid=URLRedirection/fake Office 365 landing page
35ff658910c0da186ef710711aa1c774756bc6e2855d7783bb2ff0a36edf0308SHA256NOW.API.JS (version 2.1.9)
hxxps://noirlegacy-panel-1.website/uuurrlllURLUpdated phishing redirect (version 2.1.10)
hxxps://sun-shine.pages.dev/#?refid=URLAlternate redirection (version 2.1.10)
8f02b3108099ae84d5c242b5ba061abf04034c893d5841ed8492f3637e57043dSHA256NOW.API.JS (version 2.1.10)

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant updates

Mandvi
Mandvi
Mandvi is a Security Reporter covering data breaches, malware, cyberattacks, data leaks, and more at Cyber Press.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here