CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Adversary-in-the-Middle Phishing Campaign Leveraging Compliance-Themed Lures Targets US Organizations

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

A large-scale adversary-in-the-middle (AiTM) phishing campaign has targeted organizations in the United States and globally between April 14 and 16, 2026, using compliance-themed lures such as 'code of conduct review' to trick recipients into accessing malicious links. The campaign delivered over 35,000 phishing attempts across approximately 13,000 organizations in 26 countries, with 92% of targets located in the U.S. Sectors heavily impacted include healthcare and life sciences, financial services, professional services, technology, and software. The attack chain uses legitimate email delivery infrastructure, including cloud-hosted Windows virtual machines, and attacker-controlled domains to distribute PDF attachments that redirect victims through Cloudflare CAPTCHA pages to bypass automated analysis. Victims are ultimately prompted to enter credentials, enabling real-time interception of authentication tokens via AiTM phishing despite MFA protections.

Timeline

  1. 05.05.2026 17:45 1 articles · 11h ago

    High-volume AiTM Phishing Campaign Targets US Organizations via Compliance-Themed Lures

    A phishing campaign conducted between April 14 and 16, 2026, used compliance-themed emails and PDF attachments to redirect victims through Cloudflare CAPTCHA pages and ultimately intercept Microsoft account credentials via adversary-in-the-middle (AiTM) phishing. Over 35,000 attempts were observed across 13,000 organizations in 26 countries, with 92% of targets in the U.S. The attack chain involved legitimate email delivery services, cloud-hosted Windows VMs, and attacker-controlled domains to evade detection. AiTM phishing allowed real-time interception of authentication tokens, bypassing non-phishing-resistant MFA.

    Show sources

Information Snippets