Social engineering and phishing

Microsoft Security Blog T2 clear 53 words ORIGINAL
Classification
SEV 1/10
May 4 8 min read Breaking the code: Multi-stage ‘code of conduct’ phishing campaign leads to AiTM token compromise Microsoft Defender Research observed a large-scale credential theft campaign that exemplifies this trend, using code of conduct-themed lures, a multi-step attack chain, and legitimate email services to distribute fully authenticated messages from attacker-controlled domains.
CONFIDENCE37%
Categories
supply_chainidentity_threatphishing
Threat Actors
Target Sectors

May 4 8 min read Breaking the code: Multi-stage ‘code of conduct’ phishing campaign leads to AiTM token compromise Microsoft Defender Research observed a large-scale credential theft campaign that exemplifies this trend, using code of conduct-themed lures, a multi-step attack chain, and legitimate email services to distribute fully authenticated messages from attacker-controlled domains.

Extracted Entities (0)
No threat entities extracted.
ID: 199Lang: enType: article