Compromised .gov SharePoint Tenant Delivers Credential Harvest via Tokenized Links

TL;DR A U.S. municipal government SharePoint tenant was compromised and used to send sharing notifications carrying tokenized credential harvest links. The domain was created in 2004, and every authentication check passed: SPF, DKIM, DMARC, and ARC. The SharePoint sharing notification format was legitimate, and the tokenized links containing sdata and xsdata parameters scanned clean across all URL scanners. Only cross-tenant community intelligence identified the pattern as malicious.

What Happened

A SharePoint sharing notification arrived from a U.S. municipal government domain registered in 2004. The email was structurally identical to every legitimate SharePoint sharing notification: standard Microsoft formatting, proper sender headers, and tokenized links containing sdata and xsdata parameters unique to the share event.

SPF passed. DKIM passed. DMARC passed. ARC passed. The sending infrastructure was Microsoft SharePoint Online operating under the government tenant. There was no spoofing, no relay abuse, and no authentication failure of any kind. The email was genuinely sent from the government SharePoint tenant because an attacker had compromised an account within that tenant.

The tokenized links scanned clean across all URL scanners that evaluated them. The sdata and xsdata parameters contain encrypted session data that varies per recipient, making each URL unique and preventing signature-based detection. The links led to a credential harvest page designed to capture Microsoft 365 login credentials.

Why It Matters

Government domain compromise represents one of the highest-trust attack vectors available. A .gov domain carries implicit authority across every reputation system, threat intelligence feed, and email security gateway. When combined with SharePoint Online as the sending platform (a Microsoft first-party service), the authentication profile is essentially perfect.

The tokenized link structure adds another layer of evasion. Unlike static phishing URLs that can be blocklisted after first detection, SharePoint sharing links with sdata and xsdata parameters are cryptographically unique per recipient. Each URL that reaches a scanner is a URL that scanner has never seen before and will never see again. Feed-based and signature-based detection cannot keep pace with this approach.

This attack exploits a fundamental assumption in email security architecture: that authentication equals legitimacy. When the compromised account belongs to a government entity, that assumption is reinforced by every layer of the security stack.

How IRONSCALES Caught It

Community intelligence across the IRONSCALES network identified a pattern of SharePoint sharing notifications from this government tenant reaching multiple unrelated organizations. While each individual email and URL appeared legitimate, the cross-tenant distribution pattern was anomalous for a municipal government SharePoint account.

Adaptive AI email security correlated the first-time sender signal (a government SharePoint account that had never previously shared documents with the target organization) with the cross-tenant community intelligence to escalate the risk assessment. The combination of behavioral analysis and community-sourced threat data caught what every authentication protocol and URL scanner missed.

See Your Risk. Run a free phishing simulation to discover whether compromised-tenant phishing emails would reach your users.

Indicators of Compromise

IndicatorTypeValue
Case IDInternal7827864d409bee7fc0c705d271b8a9df
Sender DomainDomain[redacted].gov
Domain CreatedWHOIS2004
PlatformInfrastructureSharePoint Online
Link ParametersURLsdata, xsdata (tokenized)
SPFAuthenticationpass
DKIMAuthenticationpass
DMARCAuthenticationpass
ARCAuthenticationpass
URL Scanner VerdictsDetectionClean

MITRE ATT&CK Mapping

TacticTechniqueIDNotes
Initial AccessPhishing: Spearphishing LinkT1566.002Tokenized SharePoint sharing links
Resource DevelopmentCompromise Accounts: Email AccountsT1586.002Government employee account compromised
Credential AccessInput Capture: Web Portal CaptureT1056.003Microsoft 365 credential harvest page
Defense EvasionTrusted RelationshipT1199.gov domain inherits maximum trust score
Email Attack of the Day is a daily series from IRONSCALES spotlighting real phishing attacks caught by Adaptive AI and our community of 30,000+ security professionals. Each post breaks down one attack — what it looked like, why it worked, and what you can do about it.

Explore More Articles

Say goodbye to Phishing, BEC, and QR code attacks. Our Adaptive AI automatically learns and evolves to keep your employees safe from email attacks.