Skip to product menu
close
EXPLORE ALL PRODUCTS

Sales

CRM

Comprehensive CRM platform for customer-facing teams.

CRM
Sign

Digital signature app for businesses.

Sign
Bigin

Simple CRM for small businesses moving from spreadsheets.

Bigin
Forms

Build online forms for every business need.

Forms
SalesIQ

Live chat app to engage and convert website visitors.

SalesIQ
Bookings

Appointment scheduling app for consultations with customers.

Bookings
RouteIQ

Comprehensive sales map visualization and optimal route planning solution.

RouteIQ
Thrive

Loyalty platform to reward, retain, and grow your customer base.

Thrive
Suites
CRM Plus

Unified platform to deliver top-notch customer experience.

CRM Plus

Marketing

Campaigns

Create, send, and track targeted email campaigns that drive sales.

Campaigns
Sign

Digital signature app for businesses.

Sign
Forms

Build online forms for every business need.

Forms
Social

All-in-one social media management software.

Social
SalesIQ

Live chat app to engage and convert website visitors.

SalesIQ
Survey

Design surveys to reach and interact with your audience.

Survey
Backstage

End-to-end event management software.

Backstage
Sites

Online website builder with extensive customisation options.

Sites
PageSense

Website conversion optimization and personalisation platform.

PageSense
Marketing Automation

All-in-one marketing automation software.

Marketing Automation
Webinar

Webinar platform for webcasting online webinars.

Webinar
LandingPage

Smart landing page builder to increase conversion rates

LandingPage
NEW
LeadChain

Sync, manage, and convert leads across channels seamlessly.

LeadChain
NEW
CommunitySpaces

Online community platform for individuals and businesses to grow their network and brand.

CommunitySpaces
Thrive

Loyalty platform to reward, retain, and grow your customer base.

Thrive
Suites
Marketing Plus

Unified marketing platform for marketing teams.

Marketing Plus

Commerce

Commerce

eCommerce platform to manage and market your online store.

Commerce

Service

Desk

Helpdesk software to deliver great customer support.

Desk
Assist

Remote support and unattended remote access software.

Assist
SalesIQ

Live chat app to engage and convert website visitors.

SalesIQ
Bookings

Appointment scheduling app for consultations with customers.

Bookings
FSM

End-to-end field service management platform for service businesses.

FSM
Lens

Interactive remote assistance software with augmented reality.

Lens
Suites
Service Plus

Unified platform for customer service and support teams.

Service Plus

Finance

Books

Powerful accounting platform for growing businesses.

Books
Expense

Effortless expense reporting platform.

Expense
Inventory

Powerful stock management and inventory control software.

Inventory
Sign

Digital signature app for businesses.

Sign
FREE
Invoice

100% Free invoicing solution.

Invoice
Billing

End-to-end billing solution for your business.

Billing
Commerce

eCommerce platform to manage and market your online store.

Commerce
Checkout

Collect payments online with custom branded pages.

Checkout
Practice

Practice management software for accounting firms.

Practice
Suites
Finance Plus

All-in-one suite to manage your operations and finances.

Finance Plus

Email, Storage, and Collaboration

Mail

Secure email service for teams of all sizes.

Mail
Sign

Digital signature app for businesses.

Sign
WorkDrive

Online file management for teams.

WorkDrive
Bookings

Appointment scheduling app for consultations with customers.

Bookings
Cliq

Stay in touch with teams no matter where you are.

Cliq
Connect

Employee experience platform to communicate, engage, and build positive employee relations.

Connect
Meeting

Online meeting software for all your video conferencing & webinar needs.

Meeting
ZeptoMail

Secure and reliable transactional email sending service.

ZeptoMail
Learn

Knowledge and learning management platform.

Learn
Notebook

Beautiful home for all your notes.

Notebook
Office Integrator

Built in document editors for web apps.

Office Integrator
Writer

Word processor for focused writing and discussions.

Writer
TeamInbox

Shared inboxes for teams.

TeamInbox
Show

Create, edit, and share slides with a sleek presentation app.

Show
Sheet

Spreadsheet software for collaborative teams.

Sheet
Office Suite

Powerful collaborative work platform for teams.

Office Suite
Calendar

Online business calendar to manage events and schedule appointments.

Calendar
ToDo

Collaborative task management for individuals and teams.

ToDo
FREE
PDF Editor

Collaborative online PDF editing tool.

PDF Editor
Suites
Workplace

Application suite built to improve team productivity and collaboration.

Workplace

Human Resources

People

Organize, automate, and simplify your HR processes.

People
Recruit

Intuitive recruiting platform built to provide hiring solutions.

Recruit
Expense

Effortless expense reporting platform.

Expense
Sign

Digital signature app for businesses.

Sign
Shifts

Employee scheduling and time tracking app.

Shifts
Workerly

Manage temporary staffing with an employee scheduling solution.

Workerly
Suites
People Plus

Comprehensive HR platform for seamless employee experiences.

People Plus

Security and IT Management

Creator

AI-powered platform to build custom business apps.

Creator
Assist

Remote support and unattended remote access software.

Assist
Vault

Online password manager for teams.

Vault
Directory

Workforce identity and access management solution for cloud businesses.

Directory
NEW
eProtect

Comprehensive email security and archiving for every business.

eProtect
Catalyst

Pro-code platform to build and deploy your apps.

Catalyst
Lens

Interactive remote assistance software with augmented reality.

Lens
FREE
OneAuth

Secure multi-factor authenticator (MFA) for all your online accounts.

OneAuth
Toolkit

Complete resource for any admin-related lookup queries.

Toolkit

BI and Analytics

Analytics

Modern self-service BI and analytics platform.

Analytics
DataPrep

AI-powered ETL tool for effective data integration and movement.

DataPrep
IoT

Harnessing IoT analytics for real-time operational intelligence.

IoT
Embedded BI

Embedded analytics and white label BI solutions, tailored for your needs.

Embedded BI

Project Management

Projects

Manage, track, and collaborate on projects with teams.

Projects
Sprints

Planning and tracking tool for scrum teams.

Sprints
BugTracker

Automatic bug tracking software for managing bugs.

BugTracker
Suites
Projects Plus

Unified project management platform for intelligent, data-driven work.

Projects Plus

Developer Platforms

Creator

AI-powered platform to build custom business apps.

Creator
Flow

Automate business workflows by creating smart integrations.

Flow
ZeptoMail

Secure and reliable transactional email sending service.

ZeptoMail
Office Integrator

Built in document editors for web apps.

Office Integrator
DataPrep

AI-powered ETL tool for effective data integration and movement.

DataPrep
IoT

Build, deploy, and scale IoT solutions for connected businesses.

IoT
Catalyst

Pro-code platform to build and deploy your apps.

Catalyst
Apptics

Application analytics for all apps.

Apptics
Embedded BI

Embedded analytics and white label BI solutions, tailored for your needs.

Embedded BI

IoT

IoT

Low-code IoT platform and solutions for connected businesses.

IoT
CRM Plus

Unified platform to deliver top-notch customer experience.

Try now
CRM Plus
Service Plus

Unified platform for customer service and support teams.

Try now
Service Plus
Finance Plus

All-in-one suite to manage your operations and finances.

Try now
Finance Plus
People Plus

Comprehensive HR platform for seamless employee experiences.

Try now
People Plus
Workplace

Application suite built to improve team productivity and collaboration.

Try now
Workplace
Marketing Plus

Unified marketing platform for marketing teams.

Try now
Marketing Plus
Projects Plus

Unified project management platform for intelligent, data-driven work.

Try now
Projects Plus
All-in-one suite

Zoho One

The Operating System for Business

Run your entire business on Zoho with our unified cloud software, designed to help you break down silos between departments and increase organizational efficiency.

TRY ZOHO ONE
Zoho Marketplace

With over 2000 ready-to-use extensions across 40+ categories, connect your favorite business tools with the Zoho products you already use.

EXPLORE MARKETPLACE
Skip to main content
  • HOME
  • File-sharing phishing: What is it and how does it work?

File-sharing phishing: What is it and how does it work?

For years, phishing has been a cyberattack technique that threat actors have commonly relied upon to advance their motives. Along with the evolution of these attacks, the security offered by email providers and email security solutions has also evolved. Phishing attacks have become easier to detect than before, and recipients have gotten better at spotting the signs of these attacks. 

This improvement in security features and awareness among users has led to threat actors getting more sophisticated with their attacks. Attackers are finding innovative ways to dodge security filters and avoid detection by systems. They're crafting unique attacks that exploit vulnerabilities, ensuring they're able to attain their motives. 

Among these new types of attacks created by threat actors, there are certain threats that exploit the trust users have in popular file-sharing sites and the personnel in their own organization. These attacks are called file-sharing phishing attacks. In this article, we'll explore what file-sharing phishing is, the attack propagation technique, and the ways in which organizations can protect themselves from these attacks. 

What is file-sharing phishing?

File-sharing phishing refers to a type of phishing attack in which the cybercriminal assumes the identity of someone the email recipient trusts and sends an email containing a link to a document. The document included in the email seems innocuous at first sight, but it actually contains a phishing link or some malicious content that can infest the recipient's computer or the organization's network. 

Attackers succeed with this type of phishing because a company's employees trust emails sent by internal members. They also trust email notifications from popular file-sharing sites, owing to the legitimacy and nature of usage among the company. When they receive an email that doesn't fall under any irregular pattern, they place trust in the sender and the email, and proceed to take the action that's expected from them. 

Stages of a file-sharing phishing attack

1. Reconnaissance and setup
Before threat actors launch their attack, they conduct extensive research to understand the workings of the company, the usual internal communication patterns, and the sender email addresses associated with the type of email they're planning to send. 
For example, if the attack revolves around sending an email with a document titled "Improved Employee Benefits," they research the usual sender of such emails, the month of the year during which such emails are usually sent by the company, and the file-sharing platform commonly used. One they get these details right, they launch the attack. 

2. Attack initiation
In the second stage, they launch the attack by identifying their victims. In this stage, they draft an email that seems convincing and creates a sense of urgency. This ensures that the victims don't have the privilege of time to verify the authenticity of the email. 
They also make sure that the attack is created to evade the security filters of the email provider. The threat actors also manipulate the documents by corrupting them and triggering an auto-recovery feature built into platforms such as Dropbox, OneDrive, Google Drive, Box, or iCloud. This way, the threat actor ensures that there's a nudge for the user to engage with the malicious document. 

3. Taking the bait 
Once the attack is launched, the attacker waits for the email recipient to perform the intended action. Because the email content sounds urgent, the employee usually falls for the bait quickly. 
Depending on the nature of the attack, clicking on the associated link could open an authentication window that's formatted to mimic the authentication popup of Microsoft, Google, or whichever platform the attacker is imitating. Once the recipient performs the required authentication, the attacker has access to their credentials. In certain cases, clicking on the link could also trigger a malicious file download. 

4. Attack propagation and aftermath
Once the attacker gains access to their target's credentials, they may use it for their own benefit by assuming their identity and carrying out conversations with the victim's contacts. They may request sensitive information or bank transfers, depending on their motives. 
If a file download is triggered, the file could be malicious in nature and corrupt the existing data on the user's system or even lock them out of the system entirely. In some cases, the file download may appear innocuous and silently monitor the actions performed on the system. The company's sensitive data may be stolen and sold for monetary benefit, or the organization may be blackmailed to pay a ransom to release the data. 

Combining these techniques of psychological manipulation and technical tactics, the attacker attains their motive.

Why are file-sharing phishing attacks so effective?

There are certain characteristics of these types of phishing attacks that make them trustworthy and effective for cybercriminals. 

Sense of familiarity: People are used to getting file-sharing links in the business and personal contexts, making them less suspicious.

Brand reputation: The presence of logos and branding from services like Google, Microsoft, or Dropbox lowers users' defenses.

Bypasses traditional filters: Because the email itself often doesn’t contain a virus or an obviously malicious link, it can slip past spam and malware filters.

Pressure and urgency: Messages often create a sense of urgency or sometimes even excitement, making people act before thinking.

Protection tips for organizations

File-sharing phishing attacks have a few indicators that can be spotted. Making sure your organization's users are familiar with these indicators, along with a few other protection measures, can keep your company safe. 

Verify the source

File-sharing phishing attacks most commonly mimic an internal email address. This way, they can get the recipient to open the attachment without suspicion. Threat actors are skilled at imitating popular file-sharing sites, which makes recipients fall prey to their tactics. Whenever there's suspicion with an email containing a document, verify the email sender's address and the username associated with it. Double check the domain name to ensure that it's authentic.

Beware of unsolicited documents

In most cases, these attacks tend to either scare or excite the user into performing an action. For example, it could be an attachment named "Employee Increment" or "Immediate Invoice Processing Needed." If you're receiving an invoice without expecting it or you haven't made any recent purchases, proceed with caution. Similarly, with internal emails, such as employee benefits, you'd have a general idea about whether there's talk of such perks within the company. Engage with the email based on the context that's set amongst your peers.

Refrain from engaging with corrupted documents

Certain threat actors use the auto-recovery feature built into word processors and other file-sharing sites to propagate their attacks. If an attachment displays an error that it's unreadable or corrupted, it could be a sign of tampering or some malicious content. In such cases, verify the authenticity of the document and the sender internally, and then engage with the document. 

Look for unusual extensions

In some of these attacks, clicking on the associated document link can lead to a file download. It's important to be extra cautious in such cases because the attack propagation can happen even before the victim realizes what's happening. These attachments are mostly sent in unusual file formats, such as .exe, .zip, or .bin. If an attachment with such an extension is present, refrain from downloading or clicking on them.

Stay away from scanning QR codes

There's little reason for QR codes to be embedded in emails. It's easier to simply provide the URL that's associated. Unless there's a very specific case, QR codes in emails can be dangerous because scanning them on your personal device takes you out of your organization's secure digital environment. Even when there's a link present, hover over the link to check the redirection before clicking on it. 

Double-check the redirected pages

If clicking on a document link in an email takes you to an authentication page, check the link it redirects you to. The page might be an imitation of the original platform created by the hacker. These days, with the availability of AI tools, it's easy to create authentic-looking pages that extract sensitive information such as account credentials or gain access to sensitive account actions. With such permissions, attackers can further their attack easily.

Conduct security awareness trainings

People are the first line of defense. Regular security awareness training helps employees spot red flags and respond appropriately when they encounter suspicious activity. Simulated phishing exercises, learning modules, and real-world examples help users stay alert. The more your employees understand how these attacks work, the less likely they are to fall for them and report anything suspicious.

Deploy an email security solution

While all of these measures can help to an extent, the most efficient way to keep file-sharing phishing and other cyber threats at bay is to deploy a robust email security solution. Email security solutions complement the security measures that are already offered by your email provider and add a layer of security. They spot the emails that seem suspicious and keep businesses safe from cybercriminals, data loss, and financial loss.


eProtect is a cloud-based email security and archiving solution that provides an additional layer of security for email accounts. The solution offers advanced threat detection mechanisms that can secure on-premise and cloud email accounts from evolving email threats. eProtect is the security solution powering Zoho Mail, a platform trusted by millions of users.

Leave a Reply

Your email address will not be published. Required fields are marked

By submitting this form, you agree to the processing of personal data according to our Privacy Policy.