Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Kuse Web App Abused to Host Phishing Document

0
Medium
Published: Wed Apr 29 2026 (04/29/2026, 19:42:00 UTC)
Source: AlienVault OTX General

Description

Attackers exploited the legitimate AI-based workplace application Kuse to host a phishing document. They used a Vendor Email Compromise (VEC) to send malicious emails from a trusted vendor's compromised mailbox, establishing trust with victims. The phishing document was hosted on Kuse's file-sharing feature under the legitimate domain app. kuse. ai, using a Markdown (. md) file extension to evade detection. Victims saw a fake document preview in Spanish prompting them to click a link, which redirected to a fraudulent Microsoft login page designed to steal credentials. The attack combined social engineering, domain trust exploitation, and vendor relationship abuse to bypass security controls.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/30/2026, 08:06:26 UTC

Technical Analysis

This threat involves abuse of the Kuse AI-based workplace application by attackers who leveraged a Vendor Email Compromise to send phishing emails from a trusted vendor's mailbox. The attackers hosted a fake blurred document with a Markdown file extension on Kuse's legitimate domain to evade detection and build trust. The phishing lure was presented as a document preview in Spanish, prompting users to click a link that redirected them to a fake Microsoft login page for credential harvesting. The campaign used multiple social engineering techniques including supply chain trust exploitation and unusual file extensions to bypass security scrutiny.

Potential Impact

The impact includes potential credential theft from victims who enter their Microsoft login details into the fraudulent page. The use of a trusted vendor's compromised email and a legitimate domain for hosting phishing content increases the likelihood of successful deception. No direct exploitation of Kuse application vulnerabilities is indicated, but the platform's file-sharing feature was abused for phishing purposes. There are no known exploits in the wild beyond this reported campaign.

Mitigation Recommendations

No official patch or fix is indicated for the Kuse application itself as this is an abuse of legitimate features rather than a software vulnerability. Organizations should be aware of the phishing campaign leveraging vendor email compromise and educate users to verify unexpected emails even from trusted vendors. Monitoring for suspicious emails and unusual file types such as Markdown files used in unexpected contexts is recommended. Since this is a social engineering attack leveraging supply chain trust, strengthening vendor email security and incident response to vendor compromises is advised. Patch status is not applicable; check vendor advisories for updates on this threat.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.trendmicro.com/en_us/research/26/d/kuse-web-app-abused-to-host-phishing-document.html"]
Adversary
null
Pulse Id
69f25f08af8a4430bf75a39f
Threat Score
null

Indicators of Compromise

Ip

ValueDescriptionCopy
ip91.92.41.64

Url

ValueDescriptionCopy
urlhttps://app.kuse.ai/sharednote/
urlhttps://onlineapp.ooraikaoo.info/?auth2=8rf22euu-2nxkebabDjjILlzldhQq2Pz

Domain

ValueDescriptionCopy
domainonlineapp.ooraikaoo.info

Threat ID: 69f309facbff5d8610a197b0

Added to database: 4/30/2026, 7:51:22 AM

Last enriched: 4/30/2026, 8:06:26 AM

Last updated: 4/30/2026, 4:29:02 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses