CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Mass phishing campaign abuses fake compliance notifications to harvest Microsoft credentials via AiTM

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

A large-scale phishing campaign targeted over 35,000 users across 13,000 organizations between April 15–16, 2026, using forged internal compliance emails to harvest Microsoft credentials via adversary-in-the-middle (AiTM) techniques. The attack leveraged polished, enterprise-style HTML templates that mimicked legitimate internal communications, including preemptive authenticity claims and organization-specific references to increase credibility. Targets in 26 countries were affected, with a primary focus on US firms. The campaign employed urgent, time-bound prompts and fake PDF attachments with links to phishing pages protected by Cloudflare CAPTCHAs to evade detection and sandboxing.

Timeline

  1. 05.05.2026 19:00 1 articles · 10h ago

    Fake compliance phishing campaign compromises credentials via AiTM in 26 countries

    Between April 15–16, 2026, a large-scale phishing operation sent enterprise-styled compliance emails to over 35,000 users across 13,000 organizations in 26 countries, primarily targeting US firms. Recipients were directed to open a PDF attachment that linked to a CAPTCHA-protected landing page, which then staged a multi-step Microsoft login flow to harvest credentials via AiTM session hijacking. The campaign employed urgency-based themes, organization-specific references, and false encryption banners to enhance legitimacy.

    Show sources

Information Snippets