The campaign utilizes a wide range of randomly generated domains and subject lines designed to instill urgency, often personalizing messages with recipient names and specific dates.
These deceptive emails, originating from seemingly legitimate OpenAI accounts, aim to trick recipients into clicking malicious links or calling fraudulent numbers.
The attackers likely initiated access using previously compromised email addresses, sending phishing emails containing a SharePoint URL disguised with subjects like "New Proposal - NDA," according to Microsoft.