iTnews Asia
  • Home
  • News
  • Security

Microsoft details massive phishing operation

Microsoft details massive phishing operation

Adversary in the Middle campaign tried to target over 10,000 organisations.

By Juha Saarinen on Jul 14, 2022 10:09AM

A phishing campaign that has been active since September 2021 has so far attempted to target more than 10,000 organisations, Microsoft security researchers said.

The campaign uses what Microsoft calls Adversary in the Middle (AitM) attacks which involves setting up a proxy server that sits between victims and the websites they wish to visit.

With a proxy server that intercepts hyper text transfer protocol (HTTP) packets from users, attackers don't need create sites that impersonate legitimate ones, as per traditional phishing campaigns.

Capturing HTTP packets enables attackers to steal targets' passwords and the session cookie generated as users authenticate on websites, the researchers said.

With the session cookie in hand, attackers can inject into their browser and skip the authentication process.

This attack works even if multi-factor authentication is enabled.

The email-borne phishing campaign looks very genuine to targets, who received messages informing them that they had a voicemail waiting, containing a HTML attachment masquerading as an MP3 audio file.

Microsoft said the phishing landing page automatically filled in the victim's email address to enhance the social engineering lure.

The technique was also an attempt by attackers to stop conventional anti-phishing tools from directly accessing the malicious URLs.

Once the attackers had captured passwords and session cookies, they would engage in payment fraud in which they would trick victims into transferring funds to accounts controlled by the threat actors.

To protect against AiTM attacks, Microsoft said that even though they attempt to bypass MFA, organisations should implement the security measure as it is very effective stopping a wide variety of threats.

"Its effectiveness is why AiTM phishing emerged in the first place," Microsoft's security researchers said.

To reach the editorial team on your feedback, story ideas and pitches, contact them here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
aitm bec email microsoft phishing security windows

Related Articles

  • Proofpoint CEO: A tool-based approach for cybersecurity is impractical
  • Akamai: AI-security is both a security imperative and an economic necessity
  • The real-life Tom & Jerry chase
  • How can we bolster our resilience against AI-enabled e-mail attacks?
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Proofpoint CEO: A tool-based approach for cybersecurity is impractical

Proofpoint CEO: A tool-based approach for cybersecurity is impractical

The real-life Tom & Jerry chase

The real-life Tom & Jerry chase

How can we bolster our resilience against AI-enabled e-mail attacks?

How can we bolster our resilience against AI-enabled e-mail attacks?

Akamai: AI-security is both a security imperative and an economic necessity

Akamai: AI-security is both a security imperative and an economic necessity

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of Lighthouse Independent Media's Privacy Policy and Terms & Conditions.