Axios and Direct Send Abuse in Microsoft 365 Phishing Campaigns
Summary
Hide ▲
Show ▼
Threat actors are exploiting HTTP client tools like Axios and Microsoft's Direct Send feature to create highly efficient phishing campaigns targeting Microsoft 365 environments. These attacks, which began in July 2025, initially targeted executives and managers in finance, healthcare, and manufacturing sectors, but have since expanded to all users. The campaigns use compensation-themed lures to trick recipients into revealing credentials and bypassing multi-factor authentication (MFA). The abuse of Axios has surged, accounting for 24.44% of all flagged user agent activity from June to August 2025. The attacks leverage Axios to intercept, modify, and replay HTTP requests, capturing session tokens or MFA codes in real-time. This method allows attackers to bypass traditional security defenses and conduct phishing operations at an unprecedented scale. Additionally, a phishing-as-a-service (PhaaS) offering called Salty 2FA has been discovered, which steals Microsoft login credentials and sidesteps MFA by simulating various authentication methods. Salty 2FA uses advanced features such as subdomain rotation, dynamic corporate branding, and sophisticated evasion tactics to enhance its phishing campaigns. It also abuses legitimate platforms to stage initial attacks and uses Cloudflare Turnstile for secure CAPTCHA replacement. Salty2FA campaigns have been active since late July 2025 and continue to this day, generating dozens of fresh analysis sessions daily. The campaigns target industries including finance, healthcare, government, logistics, energy, IT consulting, education, construction, telecom, chemicals, industrial manufacturing, real estate, and consulting. The Sneaky 2FA phishing kit has incorporated Browser-in-the-Browser (BitB) functionality to mimic browser address bars and pop-up login forms. This kit uses Cloudflare Turnstile checks to prevent security tools from accessing phishing pages and employs conditional loading techniques to ensure only intended targets can access them. The phishing domains are quickly rotated to minimize detection, and the kit uses obfuscation and disables browser developer tools to resist analysis. Sneaky2FA is a widely used PhaaS platform alongside Tycoon2FA and Mamba2FA, all targeting primarily Microsoft 365 accounts. The kit uses SVG-based attacks and attacker-in-the-middle (AitM) tactics, where the authentication process is proxied to the legitimate service through a phishing page that relays valid session tokens to the attackers. Sneaky2FA has added a BitB pop-up that mimics a legitimate Microsoft login window, adjusting dynamically to the victim’s OS and browser. An attacker stealing credentials and active session tokens can authenticate to the victim’s account, even when the two-factor authentication (2FA) protection is active.
Timeline
-
09.09.2025 17:14 5 articles · 2mo ago
Axios and Direct Send Abuse in Microsoft 365 Phishing Campaigns
Salty2FA campaigns have been active since late July 2025 and continue to this day, generating dozens of fresh analysis sessions daily. The campaigns target industries including finance, healthcare, government, logistics, energy, IT consulting, education, construction, telecom, chemicals, industrial manufacturing, real estate, and consulting. Salty2FA activity began gaining momentum in June 2025, with early traces possibly dating back to March–April 2025. Salty2FA uses Cloudflare checks to bypass automated filters and includes a multi-stage execution chain to intercept credentials and 2FA codes. Salty2FA can intercept push, SMS, and voice-based 2FA methods, leading to account takeover. Salty2FA campaigns have been spotted in the US, EU, and other regions, with a focus on enterprises. Salty2FA's phishing emails use lures designed to trigger urgency and bypass skepticism, such as "External Review Request: 2025 Payment Correction". The Sneaky 2FA phishing kit has incorporated Browser-in-the-Browser (BitB) functionality to mimic browser address bars and pop-up login forms. This kit uses Cloudflare Turnstile checks to prevent security tools from accessing phishing pages and employs conditional loading techniques to ensure only intended targets can access them. The phishing domains are quickly rotated to minimize detection, and the kit uses obfuscation and disables browser developer tools to resist analysis. Sneaky2FA is a widely used PhaaS platform alongside Tycoon2FA and Mamba2FA, all targeting primarily Microsoft 365 accounts. The kit uses SVG-based attacks and attacker-in-the-middle (AitM) tactics, where the authentication process is proxied to the legitimate service through a phishing page that relays valid session tokens to the attackers. Sneaky2FA has added a BitB pop-up that mimics a legitimate Microsoft login window, adjusting dynamically to the victim’s OS and browser. An attacker stealing credentials and active session tokens can authenticate to the victim’s account, even when the two-factor authentication (2FA) protection is active.
Show sources
- Axios Abuse and Salty 2FA Kits Fuel Advanced Microsoft 365 Phishing Attacks — thehackernews.com — 09.09.2025 17:14
- Salty2FA Takes Phishing Kits to Enterprise Level — www.darkreading.com — 09.09.2025 18:50
- Watch Out for Salty2FA: New Phishing Kit Targeting US and EU Enterprises — thehackernews.com — 10.09.2025 11:00
- Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar — thehackernews.com — 18.11.2025 20:31
- Sneaky2FA PhaaS kit now uses redteamers' Browser-in-the-Browser attack — www.bleepingcomputer.com — 19.11.2025 23:59
Information Snippets
-
Axios user agent activity surged 241% from June to August 2025, making it the most abused HTTP client tool in recent phishing campaigns.
First reported: 09.09.2025 17:141 source, 1 articleShow sources
- Axios Abuse and Salty 2FA Kits Fuel Advanced Microsoft 365 Phishing Attacks — thehackernews.com — 09.09.2025 17:14
-
The phishing campaigns use Microsoft's Direct Send feature to spoof trusted users and distribute email messages, achieving a 70% success rate.
First reported: 09.09.2025 17:141 source, 1 articleShow sources
- Axios Abuse and Salty 2FA Kits Fuel Advanced Microsoft 365 Phishing Attacks — thehackernews.com — 09.09.2025 17:14
-
The attacks began in July 2025, initially targeting executives and managers in finance, healthcare, and manufacturing sectors.
First reported: 09.09.2025 17:141 source, 1 articleShow sources
- Axios Abuse and Salty 2FA Kits Fuel Advanced Microsoft 365 Phishing Attacks — thehackernews.com — 09.09.2025 17:14
-
Axios is used to intercept, modify, and replay HTTP requests, capturing session tokens or MFA codes in real-time.
First reported: 09.09.2025 17:141 source, 1 articleShow sources
- Axios Abuse and Salty 2FA Kits Fuel Advanced Microsoft 365 Phishing Attacks — thehackernews.com — 09.09.2025 17:14
-
The campaigns use compensation-themed lures to trick recipients into opening PDF documents containing malicious QR codes.
First reported: 09.09.2025 17:141 source, 1 articleShow sources
- Axios Abuse and Salty 2FA Kits Fuel Advanced Microsoft 365 Phishing Attacks — thehackernews.com — 09.09.2025 17:14
-
The phishing pages are hosted on Google Firebase infrastructure to capitalize on its reputation.
First reported: 09.09.2025 17:141 source, 1 articleShow sources
- Axios Abuse and Salty 2FA Kits Fuel Advanced Microsoft 365 Phishing Attacks — thehackernews.com — 09.09.2025 17:14
-
Salty 2FA is a PhaaS offering that steals Microsoft login credentials and sidesteps MFA by simulating various authentication methods.
First reported: 09.09.2025 17:142 sources, 4 articlesShow sources
- Axios Abuse and Salty 2FA Kits Fuel Advanced Microsoft 365 Phishing Attacks — thehackernews.com — 09.09.2025 17:14
- Salty2FA Takes Phishing Kits to Enterprise Level — www.darkreading.com — 09.09.2025 18:50
- Watch Out for Salty2FA: New Phishing Kit Targeting US and EU Enterprises — thehackernews.com — 10.09.2025 11:00
- Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar — thehackernews.com — 18.11.2025 20:31
-
Salty2FA uses subdomain rotation with each session request.
First reported: 09.09.2025 18:502 sources, 2 articlesShow sources
- Salty2FA Takes Phishing Kits to Enterprise Level — www.darkreading.com — 09.09.2025 18:50
- Watch Out for Salty2FA: New Phishing Kit Targeting US and EU Enterprises — thehackernews.com — 10.09.2025 11:00
-
Salty2FA abuses legitimate platforms to stage the initial attack vector.
First reported: 09.09.2025 18:502 sources, 2 articlesShow sources
- Salty2FA Takes Phishing Kits to Enterprise Level — www.darkreading.com — 09.09.2025 18:50
- Watch Out for Salty2FA: New Phishing Kit Targeting US and EU Enterprises — thehackernews.com — 10.09.2025 11:00
-
Salty2FA dynamically deploys corporate branding to match the theme of message lures.
First reported: 09.09.2025 18:502 sources, 2 articlesShow sources
- Salty2FA Takes Phishing Kits to Enterprise Level — www.darkreading.com — 09.09.2025 18:50
- Watch Out for Salty2FA: New Phishing Kit Targeting US and EU Enterprises — thehackernews.com — 10.09.2025 11:00
-
Salty2FA mimics six different methods of multifactor authentication (MFA).
First reported: 09.09.2025 18:502 sources, 2 articlesShow sources
- Salty2FA Takes Phishing Kits to Enterprise Level — www.darkreading.com — 09.09.2025 18:50
- Watch Out for Salty2FA: New Phishing Kit Targeting US and EU Enterprises — thehackernews.com — 10.09.2025 11:00
-
Salty2FA includes sophisticated defense tactics that block security researchers and run anti-debugging analysis.
First reported: 09.09.2025 18:502 sources, 3 articlesShow sources
- Salty2FA Takes Phishing Kits to Enterprise Level — www.darkreading.com — 09.09.2025 18:50
- Watch Out for Salty2FA: New Phishing Kit Targeting US and EU Enterprises — thehackernews.com — 10.09.2025 11:00
- Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar — thehackernews.com — 18.11.2025 20:31
-
Salty2FA uses Cloudflare Turnstile for secure CAPTCHA replacement.
First reported: 09.09.2025 18:502 sources, 3 articlesShow sources
- Salty2FA Takes Phishing Kits to Enterprise Level — www.darkreading.com — 09.09.2025 18:50
- Watch Out for Salty2FA: New Phishing Kit Targeting US and EU Enterprises — thehackernews.com — 10.09.2025 11:00
- Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar — thehackernews.com — 18.11.2025 20:31
-
Salty2FA implements dynamic branding functionality to enhance social engineering effectiveness.
First reported: 09.09.2025 18:501 source, 1 articleShow sources
- Salty2FA Takes Phishing Kits to Enterprise Level — www.darkreading.com — 09.09.2025 18:50
-
Salty2FA maintains a corporate theme database that customizes fraudulent login interfaces based on victim email domains.
First reported: 09.09.2025 18:501 source, 1 articleShow sources
- Salty2FA Takes Phishing Kits to Enterprise Level — www.darkreading.com — 09.09.2025 18:50
-
Salty2FA supports customized branding across various sectors, including healthcare, financial services, technology, energy, and automotive.
First reported: 09.09.2025 18:501 source, 1 articleShow sources
- Salty2FA Takes Phishing Kits to Enterprise Level — www.darkreading.com — 09.09.2025 18:50
-
Salty2FA offers advanced evasion capabilities, including geo-blocking, ASN/IP filtering, and JavaScript-based anti-debugging.
First reported: 09.09.2025 18:501 source, 1 articleShow sources
- Salty2FA Takes Phishing Kits to Enterprise Level — www.darkreading.com — 09.09.2025 18:50
-
Salty2FA sets up campaigns rapidly, registering a trial account within a legitimate domain to impersonate known businesses.
First reported: 09.09.2025 18:501 source, 1 articleShow sources
- Salty2FA Takes Phishing Kits to Enterprise Level — www.darkreading.com — 09.09.2025 18:50
-
Salty2FA uses OneDrive sharing pages with links to lure victims into clicking on phishing pages.
First reported: 09.09.2025 18:501 source, 1 articleShow sources
- Salty2FA Takes Phishing Kits to Enterprise Level — www.darkreading.com — 09.09.2025 18:50
-
Salty2FA campaigns have been active since late July 2025 and continue to this day, generating dozens of fresh analysis sessions daily.
First reported: 10.09.2025 11:001 source, 1 articleShow sources
- Watch Out for Salty2FA: New Phishing Kit Targeting US and EU Enterprises — thehackernews.com — 10.09.2025 11:00
-
Salty2FA targets industries including finance, healthcare, government, logistics, energy, IT consulting, education, construction, telecom, chemicals, industrial manufacturing, real estate, and consulting.
First reported: 10.09.2025 11:001 source, 1 articleShow sources
- Watch Out for Salty2FA: New Phishing Kit Targeting US and EU Enterprises — thehackernews.com — 10.09.2025 11:00
-
Salty2FA activity began gaining momentum in June 2025, with early traces possibly dating back to March–April 2025.
First reported: 10.09.2025 11:001 source, 1 articleShow sources
- Watch Out for Salty2FA: New Phishing Kit Targeting US and EU Enterprises — thehackernews.com — 10.09.2025 11:00
-
Salty2FA uses Cloudflare checks to bypass automated filters and includes a multi-stage execution chain to intercept credentials and 2FA codes.
First reported: 10.09.2025 11:001 source, 1 articleShow sources
- Watch Out for Salty2FA: New Phishing Kit Targeting US and EU Enterprises — thehackernews.com — 10.09.2025 11:00
-
Salty2FA can intercept push, SMS, and voice-based 2FA methods, leading to account takeover.
First reported: 10.09.2025 11:001 source, 1 articleShow sources
- Watch Out for Salty2FA: New Phishing Kit Targeting US and EU Enterprises — thehackernews.com — 10.09.2025 11:00
-
Salty2FA campaigns have been spotted in the US, EU, and other regions, with a focus on enterprises.
First reported: 10.09.2025 11:001 source, 1 articleShow sources
- Watch Out for Salty2FA: New Phishing Kit Targeting US and EU Enterprises — thehackernews.com — 10.09.2025 11:00
-
Salty2FA's phishing emails use lures designed to trigger urgency and bypass skepticism, such as "External Review Request: 2025 Payment Correction".
First reported: 10.09.2025 11:001 source, 2 articlesShow sources
- Watch Out for Salty2FA: New Phishing Kit Targeting US and EU Enterprises — thehackernews.com — 10.09.2025 11:00
- Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar — thehackernews.com — 18.11.2025 20:31
-
Sneaky 2FA has incorporated Browser-in-the-Browser (BitB) functionality to mimic browser address bars and pop-up login forms.
First reported: 18.11.2025 20:312 sources, 2 articlesShow sources
- Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar — thehackernews.com — 18.11.2025 20:31
- Sneaky2FA PhaaS kit now uses redteamers' Browser-in-the-Browser attack — www.bleepingcomputer.com — 19.11.2025 23:59
-
Sneaky 2FA uses Cloudflare Turnstile checks to prevent security tools from accessing phishing pages.
First reported: 18.11.2025 20:312 sources, 2 articlesShow sources
- Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar — thehackernews.com — 18.11.2025 20:31
- Sneaky2FA PhaaS kit now uses redteamers' Browser-in-the-Browser attack — www.bleepingcomputer.com — 19.11.2025 23:59
-
Sneaky 2FA employs conditional loading techniques to ensure only intended targets can access phishing pages.
First reported: 18.11.2025 20:312 sources, 2 articlesShow sources
- Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar — thehackernews.com — 18.11.2025 20:31
- Sneaky2FA PhaaS kit now uses redteamers' Browser-in-the-Browser attack — www.bleepingcomputer.com — 19.11.2025 23:59
-
Sneaky 2FA phishing domains are quickly rotated to minimize detection.
First reported: 18.11.2025 20:312 sources, 2 articlesShow sources
- Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar — thehackernews.com — 18.11.2025 20:31
- Sneaky2FA PhaaS kit now uses redteamers' Browser-in-the-Browser attack — www.bleepingcomputer.com — 19.11.2025 23:59
-
Sneaky 2FA uses obfuscation and disables browser developer tools to resist analysis.
First reported: 18.11.2025 20:312 sources, 2 articlesShow sources
- Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar — thehackernews.com — 18.11.2025 20:31
- Sneaky2FA PhaaS kit now uses redteamers' Browser-in-the-Browser attack — www.bleepingcomputer.com — 19.11.2025 23:59
-
Sneaky2FA is a widely used PhaaS platform alongside Tycoon2FA and Mamba2FA, all targeting primarily Microsoft 365 accounts.
First reported: 19.11.2025 23:591 source, 1 articleShow sources
- Sneaky2FA PhaaS kit now uses redteamers' Browser-in-the-Browser attack — www.bleepingcomputer.com — 19.11.2025 23:59
-
Sneaky2FA uses SVG-based attacks and attacker-in-the-middle (AitM) tactics, where the authentication process is proxied to the legitimate service through a phishing page that relays valid session tokens to the attackers.
First reported: 19.11.2025 23:591 source, 1 articleShow sources
- Sneaky2FA PhaaS kit now uses redteamers' Browser-in-the-Browser attack — www.bleepingcomputer.com — 19.11.2025 23:59
-
Sneaky2FA has added a BitB pop-up that mimics a legitimate Microsoft login window, adjusting dynamically to the victim’s OS and browser.
First reported: 19.11.2025 23:591 source, 1 articleShow sources
- Sneaky2FA PhaaS kit now uses redteamers' Browser-in-the-Browser attack — www.bleepingcomputer.com — 19.11.2025 23:59
-
An attacker stealing credentials and active session tokens can authenticate to the victim’s account, even when the two-factor authentication (2FA) protection is active.
First reported: 19.11.2025 23:591 source, 1 articleShow sources
- Sneaky2FA PhaaS kit now uses redteamers' Browser-in-the-Browser attack — www.bleepingcomputer.com — 19.11.2025 23:59
-
BitB is a phishing technique devised by researcher mr.d0x in 2022 and has since been adopted by threat actors for real attacks targeting Facebook and Steam accounts, among other services.
First reported: 19.11.2025 23:591 source, 1 articleShow sources
- Sneaky2FA PhaaS kit now uses redteamers' Browser-in-the-Browser attack — www.bleepingcomputer.com — 19.11.2025 23:59
-
The template for the pop-up is an iframe that mimics the authentication form of legitimate services and can be customized with a specific URL and window title.
First reported: 19.11.2025 23:591 source, 1 articleShow sources
- Sneaky2FA PhaaS kit now uses redteamers' Browser-in-the-Browser attack — www.bleepingcomputer.com — 19.11.2025 23:59
-
The fake window displays a URL bar with the targeted service’s official domain address, making it look like a trustworthy OAuth pop-up.
First reported: 19.11.2025 23:591 source, 1 articleShow sources
- Sneaky2FA PhaaS kit now uses redteamers' Browser-in-the-Browser attack — www.bleepingcomputer.com — 19.11.2025 23:59
-
The victim opens a phishing link on ‘previewdoc[.]com’ and goes through a Cloudflare Turnstile bot check before being prompted to sign in with Microsoft to view a document.
First reported: 19.11.2025 23:591 source, 1 articleShow sources
- Sneaky2FA PhaaS kit now uses redteamers' Browser-in-the-Browser attack — www.bleepingcomputer.com — 19.11.2025 23:59
-
If the ‘Sign in with Microsoft’ option is clicked, the fake BitB window is rendered, featuring a fake Microsoft URL bar, resized and styled appropriately for Edge on Windows or Safari on macOS.
First reported: 19.11.2025 23:591 source, 1 articleShow sources
- Sneaky2FA PhaaS kit now uses redteamers' Browser-in-the-Browser attack — www.bleepingcomputer.com — 19.11.2025 23:59
-
Inside the fake pop-up, Sneaky2FA loads its reverse-proxy Microsoft phishing page, leveraging the real login flow to steal both the account credentials and the session token via its AitM system.
First reported: 19.11.2025 23:591 source, 1 articleShow sources
- Sneaky2FA PhaaS kit now uses redteamers' Browser-in-the-Browser attack — www.bleepingcomputer.com — 19.11.2025 23:59
-
BitB is used as a cosmetic deception layer on top of Sneaky2FA’s existing AitM capabilities, adding more realism to the attack chain.
First reported: 19.11.2025 23:591 source, 1 articleShow sources
- Sneaky2FA PhaaS kit now uses redteamers' Browser-in-the-Browser attack — www.bleepingcomputer.com — 19.11.2025 23:59
-
The phishing kit also uses conditional loading, sending bots and researchers to a benign page instead.
First reported: 19.11.2025 23:591 source, 1 articleShow sources
- Sneaky2FA PhaaS kit now uses redteamers' Browser-in-the-Browser attack — www.bleepingcomputer.com — 19.11.2025 23:59
-
Push Security reports that these phishing sites are crafted with evasion in mind and are unlikely to trigger warnings when visited.
First reported: 19.11.2025 23:591 source, 1 articleShow sources
- Sneaky2FA PhaaS kit now uses redteamers' Browser-in-the-Browser attack — www.bleepingcomputer.com — 19.11.2025 23:59
-
The HTML and JavaScript of Sneaky2FA pages are heavily obfuscated to evade static detection and pattern-matching, such as breaking up UI text with invisible tags, embedding background and interface elements as encoded images instead of text, and other changes that are invisible to the user but make it hard for scanning tools to fingerprint the page.
First reported: 19.11.2025 23:591 source, 1 articleShow sources
- Sneaky2FA PhaaS kit now uses redteamers' Browser-in-the-Browser attack — www.bleepingcomputer.com — 19.11.2025 23:59
-
One way to determine if a pop-up login form is authentic is to try to drag it outside the original browser window. This is not possible with an iframe because it is linked to its parent window.
First reported: 19.11.2025 23:591 source, 1 articleShow sources
- Sneaky2FA PhaaS kit now uses redteamers' Browser-in-the-Browser attack — www.bleepingcomputer.com — 19.11.2025 23:59
-
Additionally, a legitimate pop-up appears in the taskbar as a separate browser instance.
First reported: 19.11.2025 23:591 source, 1 articleShow sources
- Sneaky2FA PhaaS kit now uses redteamers' Browser-in-the-Browser attack — www.bleepingcomputer.com — 19.11.2025 23:59
Similar Happenings
TruffleNet Attack Campaign Targeting AWS Environments
The TruffleNet attack campaign leverages stolen credentials to target AWS environments, particularly Amazon's Simple Email Service (SES). The campaign uses the open-source scanning tool TruffleHog and exploits legitimate tools like Portainer to perform reconnaissance and execute downstream business email compromise (BEC) attacks. The campaign involved over 800 unique hosts across 57 distinct Class C networks. Attackers use legitimate AWS APIs to test stolen credentials and perform reconnaissance. The campaign also includes BEC attacks targeting the oil and gas sector, using compromised WordPress sites to establish sending identities.
Atroposia malware-as-a-service platform discovered
A new malware-as-a-service (MaaS) platform named Atroposia offers cybercriminals a remote access trojan (RAT) with capabilities for persistent access, evasion, data theft, and local vulnerability scanning. The malware is available for a $200 monthly subscription and includes advanced features such as hidden remote desktop, file system control, data exfiltration, clipboard theft, credential theft, cryptocurrency wallet theft, and DNS hijacking. Atroposia was first identified by researchers at Varonis on October 15, 2025, and has been observed being promoted on underground forums. The platform includes modules for hidden remote desktop sessions, file management, data exfiltration, credential theft, clipboard monitoring, DNS hijacking, and local vulnerability scanning. The vulnerability scanner audits missing patches, unsafe settings, and vulnerable software, allowing attackers to prioritize exploits. The platform can be combined with SpamGPT and MatrixPDF to create a plug-and-play criminal toolkit. SpamGPT automates phishing campaign creation, SMTP/IMAP cracking, and deliverability tooling, while MatrixPDF weaponizes ordinary PDF files to bypass email filters. Atroposia uses encrypted command and control (C2) servers to foil traffic inspection and automatically escalates privileges via UAC bypass to gain admin rights and install multiple persistence mechanisms.
Phishing campaign targets LastPass and Bitwarden users to install remote access tools
A phishing campaign is targeting LastPass and Bitwarden users with fake breach alerts. The emails urge recipients to download a supposedly more secure desktop version of the password manager, which installs Syncro, an RMM tool, and ScreenConnect remote support software. The campaign began over the Columbus Day holiday weekend, exploiting reduced staffing. LastPass has confirmed it has not been hacked and is actively working to mitigate the phishing campaign. The phishing emails are well-crafted and claim to address vulnerabilities in older .exe installations, urging users to update to a more secure MSI format. The threat actors use domains like 'lastpasspulse[.]blog' and 'bitwardenbroadcast[.]blog' to send these emails. The malware installs Syncro and ScreenConnect, allowing the threat actors to remotely access the compromised endpoints, deploy further malware, and steal data. The phishing emails use the subject line 'We Have Been Hacked - Update Your LastPass Desktop App to Maintain Vault Security' and are sent from email addresses like hello@lastpasspulse[.]blog or hello@lastpassgazette[.]blog. The phishing site is hosted at lastpassdesktop[.]com or lastpassgazette[.]blog, and another URL, lastpassdesktop[.]app, has been registered by the threat actor for potential future use.
Storm-2657 Targets University HR Employees in Payroll Hijacking Campaign
A cybercrime gang, Storm-2657, has been targeting university employees in the United States since March 2025 to hijack salary payments. The attackers have successfully compromised 11 accounts at three universities, sending phishing emails to nearly 6,000 email accounts across 25 universities. The campaign, codenamed Payroll Pirates, exploits a lack of multifactor authentication (MFA) or phishing-resistant MFA to compromise Workday accounts and other third-party HR SaaS platforms. The attackers use sophisticated social engineering tactics and adversary-in-the-middle (AITM) links to steal MFA codes, enabling them to gain access to Exchange Online accounts. Once inside, they alter salary payment configurations and redirect payments to accounts under their control. The attackers also create inbox rules to delete incoming warning notification emails from Workday and enroll their own phone numbers as MFA devices for victim accounts. The compromised email accounts are used to distribute further phishing emails, both within the organization and to other universities. The attacks have been ongoing since March 2025, with Microsoft identifying affected customers and providing mitigation guidance. The campaign has been observed targeting a range of U.S.-based organizations, particularly in the higher education sector, and any software-as-a-service (SaaS) platform storing HR or payment and bank account information.
FileFix Attack Evolves with Cache Smuggling Technique
A new variant of the FileFix social engineering attack uses cache smuggling to evade security software. This technique involves hiding a malicious ZIP archive within a browser's cache to bypass detection. The attack impersonates a Fortinet VPN Compliance Checker and tricks users into executing a PowerShell script through the Windows File Explorer address bar. The script extracts the malicious payload from the cache and executes it. This new variant was first observed by cybersecurity researcher P4nd3m1cb0y and detailed by Marcus Hutchins of Expel. The attack has been adopted by various threat actors, including ransomware groups. Additionally, a new ClickFix kit called the IUAM ClickFix Generator has been discovered, which automates the creation of ClickFix-style lures.