Case Study

Protected While Their Customer Wasn’t: Stopping a Phishing Attack in Its Tracks

When a sophisticated phishing campaign hit a Southern California construction company and one of their customers, the difference between a breach and a near-miss came down to one thing: the right security stack.

The Situation

A Southern California construction company managed by netMethods received a wave of sophisticated phishing emails targeting multiple staff members. The emails were well-crafted — impersonating a known subcontractor contact, referencing real project names and details, and containing a malicious link designed to harvest Microsoft 365 credentials. To an untrained eye, they were convincing. In an industry where vendor invoices, project updates, and payment requests flow constantly via email, that kind of social engineering is particularly dangerous.

At the same time, the same phishing campaign hit one of the construction company’s customers — an organization that did not have equivalent security controls in place. That customer’s staff clicked the link. Credentials were compromised. Their Microsoft 365 environment was accessed by the attacker, who used the foothold to send additional phishing emails from a legitimate, trusted address — making the next wave even harder to identify as malicious.

The contrast between what happened to the customer and what didn’t happen to the netMethods client tells the story.

 

What the Attacker Did

•       Sent phishing emails impersonating a known subcontractor contact, referencing real project details

•       Embedded a credential harvesting link designed to capture Microsoft 365 login information

•       Compromised the customer’s environment after staff clicked the link and entered credentials

•       Used the compromised customer account to send additional phishing emails from a trusted address

•       Attempted lateral movement within the customer’s environment to access financial and project systems

 

Why the Construction Company Was Protected

Layer 1: Email Security Stopped the Initial Wave

The phishing emails never reached most inboxes. The company’s advanced email security platform — which analyzes every inbound message for malicious links, suspicious attachments, spoofed sender identities, and behavioral anomalies — quarantined the majority of the phishing emails before they were ever seen by staff. The few that made it through were flagged with security warnings that prompted caution.

Layer 2: Endpoint Protection Caught What Email Missed

For the small number of emails that reached inboxes, the company’s AI-driven endpoint detection and response platform was monitoring behavior at the device level. When one staff member clicked a link in a flagged email, the endpoint agent identified the resulting browser behavior as consistent with a credential harvesting attempt and blocked the connection in real time. The staff member never reached the malicious page. No credentials were entered.

Layer 3: Multi-Factor Authentication Blocked Credential Use

Even in scenarios where credentials might have been captured, the company’s mandatory multi-factor authentication across all Microsoft 365 accounts meant that a stolen password alone was not enough to gain access. Every login attempt — from any device, any location — required a second factor that only the legitimate user could provide. The attacker had no path in.

Layer 4: Microsoft 365 Security Configuration Flagged Anomalies

When the attacker later attempted to access the construction company’s environment using emails sent from the compromised customer account, Microsoft 365’s security configuration — including conditional access policies, login anomaly detection, and geographic restriction rules — flagged the access attempts as suspicious and blocked them. The netMethods team received alerts and investigated immediately, confirming no unauthorized access had occurred and notifying the client.

 

What Happened to the Customer

Without equivalent controls in place, the customer’s outcome was significantly different. Staff credentials were harvested after employees clicked the phishing link. The attacker accessed the customer’s Microsoft 365 environment, exfiltrated contact lists, email history, and project financial data, and used a legitimate account to distribute a second wave of phishing emails to the customer’s vendors and partners — including the construction company. The customer spent weeks remediating the breach, notifying affected parties, and managing the reputational fallout with their own client base.

The incident was not the result of unusual sophistication on the attacker’s part. It was the result of a gap between what the customer had in place and what the situation required.

 

The Outcome

The construction company experienced zero financial loss, zero compromised records, and zero unauthorized access — despite being directly targeted in a coordinated phishing campaign. The layered security stack deployed and managed by netMethods worked exactly as designed: each layer caught what the previous one didn’t, and no single point of failure was enough to let the attack through.

The incident prompted the construction company to share the netMethods security framework with several of their subcontractors and vendors — and led to two additional organizations engaging netMethods for security assessments.

 

The Security Stack That Made the Difference

•       Advanced email security — phishing detection, malicious link filtering, sender verification

•       AI-driven endpoint detection and response — real-time behavioral threat blocking

•       Multi-factor authentication — enforced across all Microsoft 365 accounts and devices

•       Microsoft 365 conditional access and anomaly detection — blocking suspicious login attempts

•       24/7 monitoring and alerting — netMethods team notified and investigated within minutes

 

A Note on Layered Security

No single security tool stops every threat. The reason this client was protected while their vendor wasn’t wasn’t because one tool caught everything — it’s because the layers worked together. Email security reduced the volume of threats that reached users. Endpoint protection caught what got through. MFA blocked credential use even if credentials had been captured. And active monitoring meant the team knew what was happening in real time.

That’s the philosophy behind how netMethods designs security environments. Not a single layer and hope for the best — defense in depth, with every layer covering the gaps in the one before it.

 

About netMethods

netMethods is a managed IT services provider headquartered in Lake Forest, CA, with over 25 years of experience supporting organizations across Orange County and Southern California. We specialize in managed IT, cloud infrastructure, IT security, and practical AI solutions for healthcare, manufacturing, public sector, and professional services organizations.

netmethods.com   |   info@netmethods.com   |   949.309.2941