Forsyte IT Solutions
Forsyte IT Solutions
  • Why Guardian 365

Defending Against “Legitimate Infrastructure” File-Sharing Phishing Campaigns

Share This Post

K‑12 school districts, colleges and universities, and public sector agencies operating in Microsoft 365 are increasingly being targeted by phishing campaigns that abuse legitimate cloud collaboration infrastructure. These attacks exploit native file‑sharing features in SharePoint Online, OneDrive for Business, and Google Drive to deliver malicious content while evading traditional email security controls.

For education and government organizations—where external collaboration is essential and security teams often operate with limited staffing and budget—these campaigns present a particularly high risk. Because the emails originate from trusted Microsoft or Google infrastructure and follow standard collaboration workflows, they frequently bypass Microsoft Defender for Office 365 native defenses and appear legitimate to both users and security tooling.

Guardian 365 has observed this technique across K‑12, higher education, and public sector tenants monitored by the Guardian 365 24x7x365 Security Operations Center (SOC),making it a growing concern for CISOs, IT directors, and SOC teams supporting education and government environments.

How These Attacks Target Education and Public Sector Tenants

Legitimate infrastructure phishing campaigns leverage workflows that are common—and typically required by essential business and operational processes—in education and government:

1. Attacker‑Controlled Cloud Tenant Creation

Threat actors create their own Microsoft 365 or Google Workspace tenant, establishing legitimate collaboration infrastructure later to be used in sharing the malicious content.

2. Malicious Content Hosted in Trusted Platforms

Credential harvesting pages, malware, or other malicious content is uploaded to:

  • OneDrive for Business
  • SharePoint Online
  • Google Drive

3. Abuse of Native File‑Sharing Invitations

Attackers send file‑sharing invitations to users in school districts, universities, or government agencies using built‑in sharing features. See screenshot below for the “anatomy” of one of these emails. Note the non-customizable tenant name inclusion at the bottom of the message, as this section plays a key role in the available containment measures.

Image of Phishing Example

4. Delivery via Trusted Notification Emails

Users receive standard system‑generated emails from trusted sender addresses such as:

  • no-reply@sharepointonline.com
  • drive-shares-dm-noreply@google.com

These messages often resemble routine collaboration requests from vendors, partner institutions, grant administrators, or peer agencies—contexts that are extremely common in education and public sector operations.

From a security perspective:

  • SPF, DKIM, and DMARC validation succeeds
  • Sender domains are legitimate
  • URLs resolve to Microsoft or Google infrastructure
  • Threat intelligence may not yet flag the content

The bottom line here? These messages are very likely to pass even aggressively configured MDO policies and end up in user inboxes without further containment measures in place.

Why Defender XDR and MDO Often Miss These Campaigns

Education and public sector security teams often rely on Microsoft Defender XDR and Defender for Office 365 as primary email security controls. While effective against spoofing and commodity phishing, these platforms are challenged by legitimate infrastructure abuse.

Traditional detection relies on:

  • Suspicious or newly registered domains
  • Malicious sending infrastructure
  • Known bad URLs or payloads

In these campaigns, no spoofing occurs. The attacker uses Microsoft or Google services exactly as designed, creating a blind spot for reputation‑based filtering—even in aggressively tuned environments.

Additional Risk: Compromised Legitimate Education or Government Tenants

Guardian 365 has also observed similar file‑sharing activity originating from compromised accounts within legitimate school districts, universities, or public sector agencies. These cases are especially difficult to detect because:

  • The sending tenant is reputable
  • Email authentication and infrastructure signals appear normal
  • External collaboration is expected behavior

In these scenarios, Guardian 365 recommends deeper inspection of message content to identify behavioral indicators such as:

  • Repeated or generic language
  • Unusual file names
  • References to unfamiliar institutions or agencies
  • Inconsistencies in tone or formatting

These indicators can be operationalized using Exchange Transport Rules (ETRs) and Microsoft Sentinel analytic rules.

Recommended Technical Mitigation for Education and Government

Targeted Exchange Transport Rules (Most Effective)

For most education and public sector organizations, the most reliable mitigation is targeted Exchange Transport Rules aligned with Defender XDR telemetry.

File‑sharing notification templates include the sending tenant’s organization name, which is hard‑coded into the email body. This provides a strong detection signal that can be combined with:

  • Suspicious file names
  • Repeated sharing attempts
  • Known malicious tenant identifiers

Example Rule Logic

Conditions

  • Sender address equals no-reply@sharepointonline.com
  • Subject or body contains <Malicious Tenant Name> (“Adarsh Public Schools Vikas puri” in the example above)

Actions

  • Delete message without delivery or
  • Quarantine message

This approach allows districts, universities, and agencies to block specific campaigns without disabling legitimate external collaboration, which is critical in public sector environments.

Alternative Approach for High‑Volume Campaigns

When attackers frequently rotate tenant names, maintaining targeted rules can become difficult for lean IT teams.

In these cases, Guardian 365 recommends broader rules that:

Detect SharePoint or OneDrive sharing notifications

Prepend warning banners instead of blocking messages

This approach balances security with usability and is often more practical for K‑12 districts and smaller public sector agencies with limited SOC capacity. Message disclaimers (warnings) used in this manner can be a very effective user-focused method to contain the spread and minimize the effectiveness of campaigns that cannot safely be contained via the ETR block/quarantine approach above without impacting legitimate mail flow. An example disclaimer is included below. These are configured through providing the transport rule with a simple HTML code block:

Security Warning With text

User Awareness in Education and Government Environments

Defense and containment mechanisms that remove threats altogether from end user visibility are always preferred, but campaigns like these also reinforce the long-standing truth that user training remains an essential layer of defense, particularly in environments with:

  • Large, diverse user populations
  • High turnover (students, adjunct faculty, seasonal staff)
  • Frequent external collaboration

Users should be encouraged to scrutinize file‑sharing notifications for:

  • Unexpected or unsolicited file shares
  • Generic file names (e.g., “Invoice,” “Document”)
  • Sender organizations unrelated to their role
  • Executive or administrator impersonation
  • Unrecognized tenant names or domains

Reducing successful credential compromise directly improves Defender XDR signal quality and downstream Sentinel detections. As a reminder, the Guardian 365 service provides administrative and configuration support for executing attack simulation training (or training only) campaigns on a quarterly basis. Contact your CSAM to get started!

Summary: Control Effectiveness for Education and Public Sector

Control  Effectiveness  Context 
Microsoft Defender for Office 365  Low  Legitimate infrastructure often bypasses filtering 
Targeted Exchange Transport Rules  High  Most effective for known malicious tenants 
Broad Rules + Warning Banners  Medium  Practical for lean IT and SOC teams 
User Awareness (Attack Simulation) Training  Medium  Critical in high‑collaboration environments 

 

More To Explore

Schedule a Pen Test

The Guardian 365 Pen Test assesses your systems by simulating cyberattacks on internal resources, external resources, and web apps.

See identify configuration issues and vulnerabilities that external and internal attackers could use to exploit your systems. Sign up for a Guardian 365 Pen Test to enhance your security today!

Contact - Schedule a Pen Test
Name
Name
First
Last

EDUCATION LEADERS TALK SECURITY

You’re in the right place! Complete the form to hear the latest Guardian 365 security discussion featuring IT leaders from Spelman College and Spring Grove Area School District. You won’t want to miss this!

Guardian 365: Education Leaders Talk Security
Name
Name
First
Last

Cybersecurity Insurance Audit

Let us help you save money on your Cybersecurity Insurance by providing an audit of your current environment, and provide recommendations on how to reduce the cost of your insurance policy,

Contact - Cybersecurity Insurance
Name
Name
First
Last

Request a Demo

At Forsyte Guardian 365, we believe in transparency and hands-on experiences. Complete the form to request your personalized demo. Remember, security is not a luxury. It’s a necessity. Let’s empower your team with Guardian 365! 

Request a Demo

At Forsyte Guardian 365, we believe in transparency and hands-on experiences. Complete the form to request your personalized demo. Remember, security is not a luxury. It's a necessity. Let's empower your team with Guardian 365! 

Request A Demo
Name
Name
First
Last

Get Started

If you are experiencing a security breach or have detected suspicious activity, get help now.

Contact - Talk to an Expert
Name
Name
First
Last

Expert Recovery Services for Security Breaches

If you are experiencing a security breach or have detected suspicious activity, get help now.

Contact - Recovery Services
Name
Name
First
Last