Microsoft Warns of Sophisticated AitM Phishing Campaign Targeting US Organizations

Microsoft Warns of Sophisticated AitM Phishing Campaign Targeting US Organizations

Microsoft has issued a warning regarding a sophisticated phishing campaign actively targeting organizations in the United States. According to SecurityWeek, the attack vector involves malicious emails designed to appear as conduct reports, luring unsuspecting victims to a meticulously crafted Microsoft phishing website. This isn’t just a simple credential grab; the campaign leverages Adversary-in-the-Middle (AitM) techniques, significantly escalating its danger.

AitM attacks are a game-changer for attackers because they bypass traditional multi-factor authentication (MFA) mechanisms. By acting as a proxy between the user and the legitimate service, the attackers can intercept and replay session cookies, effectively authenticating as the user without needing their password or MFA token. This makes the phishing site far more convincing and the resulting compromise much deeper, granting persistent access.

For defenders, this means relying solely on user vigilance against phishing links is insufficient. The attacker’s calculus here is clear: target high-value US organizations with a technique that circumvents a critical layer of modern security. The focus on ‘conduct reports’ suggests a social engineering angle designed to induce immediate action and fear, further increasing the likelihood of compromise.

What This Means For You

  • If your organization is operating in the US, you are a direct target. Beyond user education, you must implement phishing-resistant MFA like FIDO2/passkeys wherever possible. Review your Conditional Access policies in Azure AD to block legacy authentication and enforce strict device compliance. Audit for suspicious sign-ins, especially those originating from unusual locations or devices, and hunt for session cookie reuse.

Related ATT&CK Techniques

Indicators of Compromise

IDTypeIndicator
Microsoft-Phishing-Campaign-2024 Phishing Malicious emails claiming to contain a 'conduct report'
Microsoft-Phishing-Campaign-2024 Phishing Microsoft phishing website leveraging Adversary-in-the-Middle (AitM) techniques
Take action on this incident
📡 Monitor microsoft.com Free · 1 watchlist slot · instant alerts on new breaches 🔍 Threat intel on Microsoft All breaches, IOCs & vendor exposure

Related coverage on Microsoft

China-Linked UAT-8302 APT Targets Governments in South America and Europe

A China-nexus advanced persistent threat (APT) group, tracked by Cisco Talos as UAT-8302, is actively targeting government entities. The Hacker News reports that attacks have...

threat-intelvulnerabilitymalwarethe-hacker-news
/SCW Vulnerability Desk /MEDIUM /⚑ 4 IOCs

EOL Software Creates CVE Blind Spots in SCA Tools

BleepingComputer reports that critical vulnerabilities often lurk in open-source software, particularly those that have reached End-of-Life (EOL) status. This EOL software frequently falls outside the...

threat-inteldata-breachmalwarevulnerabilitytools
/SCW Vulnerability Desk /HIGH /⚑ 2 IOCs /⚙ 3 Sigma

Android Critical RCE Vulnerability Patched in System Component

SecurityWeek reports a critical remote code execution (RCE) vulnerability, CVE-2026-0073, has been patched in Android’s System component. This is a severe flaw because it can...

threat-intelvulnerability
/SCW Vulnerability Desk /HIGH /⚑ 1 IOC /⚙ 3 Sigma