Campaign abusing HubSpot targets 20,000 Microsoft Azure accounts

Share:

A phishing campaign targeting automotive, chemical, and industrial manufacturing companies in Germany and the UK is abusing HubSpot to steal Microsoft Azure account credentials.

The threat actors use HubSpot Free Form Builder links and DocuSign-mimicking PDFs to redirect victims to credential-harvesting pages.

According to Palo Alto Networks’ Unit 42 team of researchers, the campaign, which started in June 2024 and remained active until at least September 2024, has compromised approximately 20,000 accounts.

“Our telemetry indicates the threat actor successfully targeted roughly 20,000 users across various European companies,” explains the Palo Alto Unit 42 report.

HubSpot used for credential harvesting

HubSpot is a legitimate customer relationship management (CRM) platform used in marketing automation, sales, customer service, analytics, and building websites and landing pages.

The Form Builder is a feature that allows users to create custom online forms to capture information from website visitors.

In the phishing campaign Unit 42 tracked, threat actors exploited HubSpot Form Builder to create at least seventeen deceptive forms to lure victims into providing sensitive credentials in the next step.

Deceptive HubSpot form
Deceptive HubSpot form
Source: Unit 42

Although the HubSpot infrastructure itself wasn’t compromised, it was used as an intermediate step to lead victims to attacker-controlled sites on ‘.buzz’ domains mimicking Microsoft Outlook Web App and Azure login pages.

Phishing page targeting Outlook accounts
Phishing page targeting Outlook accounts
Source: Unit 42

Web pages mimicking DocuSign’s document management system, French notary offices, and organization-specific login portals were also used in the attacks.

Victims were directed to those pages by DocuSign-branded phishing messages containing links to HubSpot, either on an attached PDF or embedded HTML.

Phishing email sample
Phishing email sample
Source: Unit 42

As the emails contain links to a legitimate service (HubSpot), they are not typically flagged by email security tools, so they’re more likely to reach target inboxes.

However, the phishing emails associated with this campaign failed Sender Policy Framework (SPF), DomainKeys Identified Mail (DKIM), and Domain-based Message Authentication, Reporting, and Conformance (DMARC) checks.

Overview of the attack
Overview of the attack
Source: Unit 42

Post-compromise activity

In cases of successful attacks seen by the researchers, the threat actors used VPNs to make it appear as if they were based on the country of the victimized organization.

“When IT regained control of the account, the attacker immediately initiated a password reset, attempting to regain control,” describe the Unit 42 researchers.

“This created a tug-of-war scenario in which both parties struggled for control over the account.”

Unit 42 also identified a novel Autonomous System Number (ASN) used in the campaign, which can be used for threat identification along with specific, unusual user-agent strings.

Although most of the servers that acted as the backbone of the phishing campaign have long gone offline, the activity is yet another example of legitimate service abuse, as threat actors constantly explore new avenues to bypass security tools.

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
3:30 pm, Jun 17, 2025
weather icon 27°C
L: 26° | H: 28°
overcast clouds
Humidity: 41 %
Pressure: 1024 mb
Wind: 9 mph SW
Wind Gust: 0 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 100%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 4:42 am
Sunset: 9:20 pm
DailyHourly
Daily ForecastHourly Forecast
Today 10:00 pm
weather icon
26° | 28°°C 0 mm 0% 9 mph 52 % 1025 mb 0 mm/h
Tomorrow 10:00 pm
weather icon
13° | 27°°C 0 mm 0% 7 mph 78 % 1026 mb 0 mm/h
Thu Jun 19 10:00 pm
weather icon
17° | 27°°C 0 mm 0% 11 mph 79 % 1027 mb 0 mm/h
Fri Jun 20 10:00 pm
weather icon
16° | 27°°C 0 mm 0% 11 mph 73 % 1027 mb 0 mm/h
Sat Jun 21 10:00 pm
weather icon
16° | 31°°C 0 mm 0% 9 mph 69 % 1024 mb 0 mm/h
Today 4:00 pm
weather icon
25° | 27°°C 0 mm 0% 8 mph 41 % 1024 mb 0 mm/h
Today 7:00 pm
weather icon
24° | 26°°C 0 mm 0% 9 mph 42 % 1024 mb 0 mm/h
Today 10:00 pm
weather icon
19° | 22°°C 0 mm 0% 9 mph 52 % 1025 mb 0 mm/h
Tomorrow 1:00 am
weather icon
16° | 16°°C 0 mm 0% 5 mph 68 % 1025 mb 0 mm/h
Tomorrow 4:00 am
weather icon
13° | 13°°C 0 mm 0% 4 mph 78 % 1025 mb 0 mm/h
Tomorrow 7:00 am
weather icon
17° | 17°°C 0 mm 0% 4 mph 74 % 1025 mb 0 mm/h
Tomorrow 10:00 am
weather icon
21° | 21°°C 0 mm 0% 5 mph 54 % 1025 mb 0 mm/h
Tomorrow 1:00 pm
weather icon
25° | 25°°C 0 mm 0% 6 mph 42 % 1025 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€91,186.95
-1.60%
Ethereum(ETH)
€2,213.18
-2.98%
Tether(USDT)
€0.86
0.00%
XRP(XRP)
€1.91
-1.78%
Solana(SOL)
€130.01
-4.04%
USDC(USDC)
€0.86
0.00%
Dogecoin(DOGE)
€0.148610
-3.43%
Shiba Inu(SHIB)
€0.000010
-3.56%
Pepe(PEPE)
€0.000009
-8.79%
Scroll to Top