The email landed in four inboxes at a European enterprise on a Wednesday afternoon.
Subject line: "INVITATION TO BID."
Sender: a named operations director at a legitimate Canadian construction engineering firm.
SPF, DKIM, and DMARC all passed.
The signature block included a physical address in Lachine, Quebec, a direct cell number, and a company logo. Everything about this message looked like a routine procurement outreach, the kind that lands in operations and business development inboxes every week.
Except the link labeled "RFI-32-7613-125.pdf (Preview)" didn't point to a PDF. It pointed to cheerful-hamster-e3f5c1[.]netlify[.]app, a credential-harvesting page designed to steal login credentials under the guise of a construction bidding portal.
The message followed a familiar procurement playbook. It invited the recipient's organization to submit a proposal for a specific RFI, referenced a project package with scope, deliverables, and terms, and set a deadline: proposals due by March 30, 2026, with a reply requested within two business days. A confidentiality warning reinforced the sense of legitimacy.
The social engineering was layered. The sender identity belonged to a real person at a real company, a director of operations at an established construction engineering firm with a domain registered since 2009, hosted on Cloudflare, and actively maintained. The email originated from that company's Microsoft 365 tenant, which is why every authentication check cleared without issue.
But the core call-to-action betrayed the entire setup. The hyperlink displayed as "RFI-32-7613-125.pdf" but resolved to a Netlify-hosted subdomain. That landing page didn't serve a PDF. Instead, it rendered a ConstructConnect-branded sign-in form ("Sign-in to view bid invitation") with an email field and a login prompt. ConstructConnect is a widely used construction project intelligence platform, making the impersonation feel routine to anyone in the industry.
This is credential harvesting at its most operationally aware. The attacker understood the target industry, knew the procurement workflow, and chose a third-party platform the victim would recognize and trust.
The most dangerous element of this campaign isn't the Netlify page; it's the sending account.
The email headers show a clean relay chain through Microsoft's Exchange Online Protection infrastructure. ARC (Authenticated Received Chain) seals passed at every hop. The DKIM signature validated against the sender's onmicrosoft[.]com domain. SPF confirmed the sending IP as an authorized Microsoft outbound server. There was no header manipulation, no relay abuse, and no spoofing.
The most likely explanation: the sender's Microsoft 365 account was compromised. As MITRE ATT&CK documents under Compromise Accounts: Email Accounts (T1586.002), threat actors routinely take over legitimate business email accounts to send phishing from trusted infrastructure, turning authentication from a defense into a liability.
This is the structural weakness that SEGs can't address. Email authentication protocols answer one question: did this email come from an authorized server for this domain? When the answer is yes because the attacker controls a legitimate account on that domain, authentication actively vouches for the threat.
The FBI's 2024 Internet Crime Report documented over $2.9 billion in BEC (Business Email Compromise) losses. IBM's 2024 Cost of a Data Breach Report found phishing-initiated breaches averaged $4.88 million per incident. These aren't hypothetical numbers; they're the direct cost of trusting authentication as a proxy for safety.
Static rule-based detection had no path to catching this email. The sender domain was legitimate and long-established. The authentication was flawless. The attachment, a small PNG logo image, was clean. The only malicious artifact was a single URL pointing to a free-tier hosting platform with no prior reputation flags.
Themis, the IRONSCALES virtual SOC analyst, identified the threat through converging behavioral signals:
All four affected mailboxes were quarantined within seconds, before any recipient clicked the link.
The Verizon 2025 Data Breach Investigations Report found that the median time for a user to click a phishing link is under 60 seconds from delivery. CISA's phishing guidance and Microsoft's 2024 Digital Defense Report both emphasize that credential-harvesting attacks leveraging compromised accounts and legitimate hosting infrastructure are among the hardest vectors for traditional defenses to intercept.
For security teams facing similar campaigns, three actions matter now:
| Type | Indicator | Context |
|---|---|---|
| Sender | mabernard@[REDACTED][.]com | Likely compromised Microsoft 365 account; authenticated sender |
| URL | hxxps://cheerful-hamster-e3f5c1[.]netlify[.]app/ | Credential-harvesting page impersonating ConstructConnect sign-in |
| Attachment | image002[.]png (MD5: 06b8535b3e0dfb2065b5cddf78bd8fe0) | Clean PNG, company logo, not weaponized |
| Domain | [REDACTED][.]com | Legitimate Canadian construction firm; domain registered 2009, Cloudflare DNS |
| MITRE | T1566.002 | Spearphishing Link |
| MITRE | T1204.001 | User Execution: Malicious Link |
| MITRE | T1586.002 | Compromise Accounts: Email Accounts |
| MITRE | T1608.005 | Stage Capabilities: Link Target |