Kuse Web App Abused to Host Phishing Document
Attackers exploited the legitimate AI-based workplace application Kuse to host a phishing document. They used a Vendor Email Compromise (VEC) to send malicious emails from a trusted vendor's compromised mailbox, establishing trust with victims. The phishing document was hosted on Kuse's file-sharing feature under the legitimate domain app. kuse. ai, using a Markdown (. md) file extension to evade detection. Victims saw a fake document preview in Spanish prompting them to click a link, which redirected to a fraudulent Microsoft login page designed to steal credentials. The attack combined social engineering, domain trust exploitation, and vendor relationship abuse to bypass security controls.
AI Analysis
Technical Summary
This threat involves abuse of the Kuse AI-based workplace application by attackers who leveraged a Vendor Email Compromise to send phishing emails from a trusted vendor's mailbox. The attackers hosted a fake blurred document with a Markdown file extension on Kuse's legitimate domain to evade detection and build trust. The phishing lure was presented as a document preview in Spanish, prompting users to click a link that redirected them to a fake Microsoft login page for credential harvesting. The campaign used multiple social engineering techniques including supply chain trust exploitation and unusual file extensions to bypass security scrutiny.
Potential Impact
The impact includes potential credential theft from victims who enter their Microsoft login details into the fraudulent page. The use of a trusted vendor's compromised email and a legitimate domain for hosting phishing content increases the likelihood of successful deception. No direct exploitation of Kuse application vulnerabilities is indicated, but the platform's file-sharing feature was abused for phishing purposes. There are no known exploits in the wild beyond this reported campaign.
Mitigation Recommendations
No official patch or fix is indicated for the Kuse application itself as this is an abuse of legitimate features rather than a software vulnerability. Organizations should be aware of the phishing campaign leveraging vendor email compromise and educate users to verify unexpected emails even from trusted vendors. Monitoring for suspicious emails and unusual file types such as Markdown files used in unexpected contexts is recommended. Since this is a social engineering attack leveraging supply chain trust, strengthening vendor email security and incident response to vendor compromises is advised. Patch status is not applicable; check vendor advisories for updates on this threat.
Indicators of Compromise
- ip: 91.92.41.64
- url: https://app.kuse.ai/sharednote/
- url: https://onlineapp.ooraikaoo.info/?auth2=8rf22euu-2nxkebabDjjILlzldhQq2Pz
- domain: onlineapp.ooraikaoo.info
Kuse Web App Abused to Host Phishing Document
Description
Attackers exploited the legitimate AI-based workplace application Kuse to host a phishing document. They used a Vendor Email Compromise (VEC) to send malicious emails from a trusted vendor's compromised mailbox, establishing trust with victims. The phishing document was hosted on Kuse's file-sharing feature under the legitimate domain app. kuse. ai, using a Markdown (. md) file extension to evade detection. Victims saw a fake document preview in Spanish prompting them to click a link, which redirected to a fraudulent Microsoft login page designed to steal credentials. The attack combined social engineering, domain trust exploitation, and vendor relationship abuse to bypass security controls.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This threat involves abuse of the Kuse AI-based workplace application by attackers who leveraged a Vendor Email Compromise to send phishing emails from a trusted vendor's mailbox. The attackers hosted a fake blurred document with a Markdown file extension on Kuse's legitimate domain to evade detection and build trust. The phishing lure was presented as a document preview in Spanish, prompting users to click a link that redirected them to a fake Microsoft login page for credential harvesting. The campaign used multiple social engineering techniques including supply chain trust exploitation and unusual file extensions to bypass security scrutiny.
Potential Impact
The impact includes potential credential theft from victims who enter their Microsoft login details into the fraudulent page. The use of a trusted vendor's compromised email and a legitimate domain for hosting phishing content increases the likelihood of successful deception. No direct exploitation of Kuse application vulnerabilities is indicated, but the platform's file-sharing feature was abused for phishing purposes. There are no known exploits in the wild beyond this reported campaign.
Mitigation Recommendations
No official patch or fix is indicated for the Kuse application itself as this is an abuse of legitimate features rather than a software vulnerability. Organizations should be aware of the phishing campaign leveraging vendor email compromise and educate users to verify unexpected emails even from trusted vendors. Monitoring for suspicious emails and unusual file types such as Markdown files used in unexpected contexts is recommended. Since this is a social engineering attack leveraging supply chain trust, strengthening vendor email security and incident response to vendor compromises is advised. Patch status is not applicable; check vendor advisories for updates on this threat.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.trendmicro.com/en_us/research/26/d/kuse-web-app-abused-to-host-phishing-document.html"]
- Adversary
- null
- Pulse Id
- 69f25f08af8a4430bf75a39f
- Threat Score
- null
Indicators of Compromise
Ip
| Value | Description | Copy |
|---|---|---|
ip91.92.41.64 | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttps://app.kuse.ai/sharednote/ | — | |
urlhttps://onlineapp.ooraikaoo.info/?auth2=8rf22euu-2nxkebabDjjILlzldhQq2Pz | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainonlineapp.ooraikaoo.info | — |
Threat ID: 69f309facbff5d8610a197b0
Added to database: 4/30/2026, 7:51:22 AM
Last enriched: 4/30/2026, 8:06:26 AM
Last updated: 4/30/2026, 4:29:02 PM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.