Microsoft Details Phishing Campaign Targeting 35,000 Users in 26 Countries
Microsoft has revealed details of a substantial credential theft operation, observed between April 14 and 16, 2026. This multi-stage campaign, as reported by The Hacker News, leveraged βcode of conductβ themed lures and legitimate email services to trick users. The objective was to direct victims to attacker-controlled domains and subsequently steal authentication tokens.
This sophisticated attack impacted over 35,000 users across more than 13,000 organizations in 26 different countries. The broad scope indicates a well-resourced actor, aiming for maximum reach and credential harvesting. The use of legitimate email services also makes these phishing attempts harder to detect with traditional email security gateways.
Attackers are consistently refining their social engineering tactics. This campaign highlights their shift towards abusing trusted platforms and employing contextually relevant lures to bypass defenses and gain initial access. The focus on authentication tokens, not just passwords, points to a more advanced post-compromise strategy, aiming for persistent access and session hijacking.
What This Means For You
- If your organization's users were active between April 14-16, 2026, you need to audit email logs for inbound messages with "code of conduct" themes, especially those originating from legitimate-looking but ultimately malicious domains. Prioritize MFA enforcement and review session token validity. Attackers are going for tokens precisely because MFA can be bypassed once a valid session token is captured. Educate users on the evolving nature of phishing beyond simple password prompts.
Related ATT&CK Techniques
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| Microsoft-Phishing-2026-04 | Phishing | Credential theft campaign observed between April 14 and 16, 2026 |
| Microsoft-Phishing-2026-04 | Phishing | Lures themed as 'code of conduct' |
| Microsoft-Phishing-2026-04 | Phishing | Leveraging legitimate email services for delivery |
| Microsoft-Phishing-2026-04 | Phishing | Directing users to attacker-controlled domains |
| Microsoft-Phishing-2026-04 | Phishing | Stealing authentication tokens |