<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Microsoft Defender — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/microsoft-defender/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 30 Apr 2026 15:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/microsoft-defender/feed.xml" rel="self" type="application/rss+xml"/><item><title>Q1 2026 Email Threat Landscape: Rise in Phishing Techniques and Tycoon2FA Disruption</title><link>https://feed.craftedsignal.io/briefs/2026-05-email-phishing-trends/</link><pubDate>Thu, 30 Apr 2026 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-email-phishing-trends/</guid><description>In Q1 2026, email threats increased, including credential phishing, QR code phishing, and CAPTCHA-gated campaigns, with Microsoft's disruption of the Tycoon2FA phishing platform leading to a 15% volume decrease and shifts in threat actor tactics; BEC activity remained prevalent at 10.7 million attacks.</description><content:encoded><![CDATA[<p>In the first quarter of 2026, Microsoft Threat Intelligence observed a significant rise in email-based phishing threats, totaling approximately 8.3 billion. This increase was driven by surges in QR code phishing (more than doubling over the period), CAPTCHA-gated phishing, and credential phishing attacks. Microsoft&rsquo;s Digital Crime Unit successfully disrupted the Tycoon2FA phishing-as-a-service (PhaaS) platform in early March, leading to a 15% reduction in associated email volume. However, threat actors adapted by shifting hosting providers and domain registration patterns. Business email compromise (BEC) also remained a prevalent threat, with approximately 10.7 million attacks recorded during the quarter, often characterized by low-effort, generic outreach messages. Microsoft Defender Research has also noted the emergence of AI-enabled device code phishing campaigns.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Email Delivery:</strong> Attackers send phishing emails impersonating legitimate services or organizations. These emails may contain links, QR codes, or HTML attachments.</li>
<li><strong>Victim Interaction:</strong> The victim opens the email and clicks on a malicious link or scans a QR code, redirecting them to a phishing page.</li>
<li><strong>Phishing Page Redirection:</strong> The phishing page mimics a legitimate login portal, such as Microsoft 365 or other enterprise applications.</li>
<li><strong>Credential Harvesting:</strong> The victim enters their username and password on the phishing page, which are then captured by the attacker.</li>
<li><strong>MFA Bypass (AiTM):</strong> For attacks using adversary-in-the-middle (AiTM) techniques (like those facilitated by Tycoon2FA), the attacker intercepts the MFA code and uses it to authenticate.</li>
<li><strong>Account Compromise:</strong> With the stolen credentials and MFA code (if applicable), the attacker gains unauthorized access to the victim&rsquo;s account.</li>
<li><strong>Lateral Movement/Data Theft:</strong> The attacker uses the compromised account to access sensitive data, send further phishing emails, or move laterally within the organization.</li>
<li><strong>Business Email Compromise:</strong> In BEC attacks, attackers use compromised accounts or spoofed email addresses to send fraudulent invoices or requests for wire transfers.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The observed email threats in Q1 2026 led to a high risk of credential compromise, financial loss through BEC attacks, and potential data breaches across various sectors. Although the total number of victims is not specified, the billions of phishing attempts indicate a widespread impact. Microsoft&rsquo;s disruption of Tycoon2FA temporarily reduced phishing volumes by 15%, demonstrating the potential for proactive intervention to mitigate these threats. However, threat actors are quickly adapting their techniques, indicating the need for continued vigilance and enhanced security measures. The 10.7 million BEC attacks alone represent a significant financial threat to businesses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Detect Tycoon2FA Phishing Attempts&rdquo; Sigma rule to identify email campaigns associated with the Tycoon2FA platform.</li>
<li>Enable Microsoft Defender detections to improve detection of phishing emails and malicious payloads.</li>
<li>Monitor email traffic for suspicious domain registrations, particularly those using newer generic top-level domains (TLDs) such as .DIGITAL, .BUSINESS, .CONTRACTORS, .CEO, and .COMPANY, and the resurgence of .RU registrations, to identify potential Tycoon2FA infrastructure shifts.</li>
<li>Educate users about the dangers of QR code phishing and CAPTCHA-gated attacks, emphasizing the importance of verifying the legitimacy of login pages and email senders, to reduce the effectiveness of phishing campaigns (T1566).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>email</category><category>phishing</category><category>credential-theft</category><category>Tycoon2FA</category><category>BEC</category></item><item><title>Microsoft Defender Tampering via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-defender-tampering/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-defender-tampering/</guid><description>Adversaries may disable or tamper with Microsoft Defender features via registry modifications to evade detection and conceal malicious behavior on Windows systems.</description><content:encoded><![CDATA[<p>Attackers commonly disable or tamper with Microsoft Defender features to evade detection and conceal malicious behavior within compromised Windows environments. This is often achieved by modifying specific registry keys that control the behavior and functionality of Defender components, such as real-time monitoring, exploit protection, and tamper protection itself. Such actions can significantly reduce the effectiveness of endpoint security, allowing malicious activities to proceed undetected. The references point to techniques that disable PUA protection, tamper protection, memory integrity, and real-time protection. This behavior is observed across various attack scenarios, including ransomware deployment and cryptocurrency mining campaigns.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is gained through an unspecified vector (e.g., phishing, exploitation of a vulnerability).</li>
<li>The attacker obtains elevated privileges on the system.</li>
<li>The attacker uses an administrative tool like <code>reg.exe</code> or PowerShell to modify the registry.</li>
<li>The attacker disables real-time monitoring by setting <code>HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring</code> to 1.</li>
<li>The attacker disables tamper protection by setting <code>HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Features\TamperProtection</code> to 0.</li>
<li>The attacker disables PUA Protection by setting <code>HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\PUAProtection</code> to 0.</li>
<li>With Defender weakened, the attacker executes malicious payloads, such as ransomware or cryptocurrency miners.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful tampering with Microsoft Defender can lead to a significant degradation of endpoint security posture. This can result in undetected malware infections, data breaches, and system compromise. Disabling Defender features can allow attackers to establish persistence, escalate privileges, and deploy malicious payloads without triggering alerts. The impact can range from individual system compromise to widespread network infection, depending on the attacker&rsquo;s objectives and the extent of the tampering.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Microsoft Windows Defender Tampering - Disable Realtime Monitoring&rdquo; to your SIEM to detect modifications to the <code>DisableRealtimeMonitoring</code> registry value.</li>
<li>Deploy the Sigma rule &ldquo;Microsoft Windows Defender Tampering - Disable Tamper Protection&rdquo; to detect modifications to the <code>TamperProtection</code> registry value.</li>
<li>Monitor registry modification events, specifically targeting keys associated with Microsoft Defender settings as described in the rule query.</li>
<li>Investigate any process modifying Windows Defender registry settings that are not explicitly authorized, referencing the process exclusions in the rule query.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>registry-modification</category><category>windows</category></item></channel></rss>