Skip to content
Threat Feed

Tag

Phishing

29 briefs RSS
high advisory

Multi-Stage 'Code of Conduct' Phishing Campaign Leads to AiTM Token Compromise

A widespread phishing campaign utilized 'code of conduct' lures, a multi-step attack chain, and legitimate email services to distribute authenticated messages from attacker-controlled domains, ultimately leading to adversary-in-the-middle (AiTM) token compromise, primarily targeting US-based organizations.

Microsoft Defender for Office 365 phishing credential-theft AiTM token-compromise
2r 2t 2i
medium advisory

Remote Desktop File Opened from Suspicious Path

Adversaries may abuse RDP files delivered via phishing from suspicious locations to gain unauthorized access to systems.

M365 Defender +4 initial-access rdp phishing windows
2r 2t
high threat

Q1 2026 Email Threat Landscape: Rise in Phishing Techniques and Tycoon2FA Disruption

In Q1 2026, email threats increased, including credential phishing, QR code phishing, and CAPTCHA-gated campaigns, with Microsoft's disruption of the Tycoon2FA phishing platform leading to a 15% volume decrease and shifts in threat actor tactics; BEC activity remained prevalent at 10.7 million attacks.

Microsoft Defender Storm-1747 email phishing credential-theft Tycoon2FA BEC
2r 1t
high advisory

Large-Scale OAuth Device Code Phishing Campaign Observed in April 2026

In early April 2026, Arctic Wolf tracked a large-scale device code phishing campaign across multiple regions and sectors where threat actors abused OAuth device code flow to trick victims into providing authentication codes.

Azure Active Directory oauth device-code phishing initial-access
2r 1t
medium advisory

Suspicious RDP File Execution

This rule identifies attempts to open a remote desktop file from suspicious paths, indicative of adversaries abusing RDP files for initial access via phishing.

rdp phishing initial-access windows
2r 2t
high advisory

Apple Account Notification Phishing Campaign

A phishing campaign is abusing legitimate Apple account change notifications to deliver fake iPhone purchase scams, tricking users into calling malicious support numbers.

apple phishing callback phishing email
2r 1t 5i
high advisory

n8n AI Workflow Automation Platform Abused for Malware Delivery and Device Fingerprinting

Threat actors are abusing the n8n AI workflow automation platform to deliver malware and fingerprint devices via phishing campaigns, bypassing traditional security filters by leveraging trusted infrastructure.

n8n phishing malware workflow-automation
2r 6t 2i
high advisory

SaaS Notification Pipeline Phishing and Medusa Ransomware Exploitation

Threat actors are weaponizing legitimate SaaS notification pipelines to deliver phishing and spam emails, bypassing traditional email authentication protocols, and Storm-1175 is exploiting CVE-2026-1731 to deploy Medusa ransomware.

saas phishing ransomware medusa
1r 1t 1c 2i
high advisory

SaaS Notification Pipeline Abuse for Phishing and Spam Campaigns

Attackers are abusing notification pipelines in SaaS platforms like GitHub and Jira to deliver phishing and spam emails by exploiting legitimate platform features and bypassing traditional email security measures.

saas-abuse phishing credential-harvesting github jira
3r 1t 5i
high advisory

Tycoon2FA Phishing-as-a-Service Platform Persists After Takedown

The Tycoon2FA phishing-as-a-service (PhaaS) platform, used to bypass MFA and compromise email accounts, saw a temporary decrease in activity after a law enforcement takedown, but cloud compromises have since returned to pre-disruption levels with unchanged TTPs, indicating continued threat actor activity.

phishing credential-theft cloud
2r 2t
high advisory

Tycoon2FA PhaaS Platform Resurgence After Takedown

The Tycoon2FA phishing-as-a-service (PhaaS) platform, disrupted in March 2026, has resurged with consistent tactics, employing adversary-in-the-middle (AITM) techniques to bypass MFA and compromise email accounts through phishing campaigns, credential theft, and session cookie hijacking.

phishing credential-theft MFA-bypass
2r 2t 1i
high advisory

Tycoon2FA Phishing-as-a-Service Resurgence After Takedown

The Tycoon2FA Phishing-as-a-Service platform, used to bypass multifactor authentication (MFA), has resurged to pre-takedown levels of activity following a disruption effort in March 2026, maintaining its original tactics, techniques, and procedures (TTPs) for credential harvesting and cloud compromise.

phishing credential-theft MFA-bypass phishing-as-a-service
2r 2t 1i
critical advisory

OpenBao OIDC Direct Callback Authentication Bypass Vulnerability

OpenBao versions before 2.5.2 lack user confirmation for OIDC direct callback mode, allowing attackers to perform remote phishing and bypass authentication.

openbao oidc authentication-bypass phishing
2r 1t
high advisory

Palo Alto Networks Recruiting Impersonation Phishing Campaign

Since August 2025, threat actors have been impersonating Palo Alto Networks talent acquisition staff in a sophisticated phishing campaign targeting senior professionals, using social engineering tactics to solicit fraudulent resume fees.

phishing recruiting social-engineering scam
2r 2t 6i
high advisory

Device Code Phishing Campaign Targeting Cloud Platforms

A phishing campaign abuses Microsoft's Device Code OAuth flow to gain access to cloud-based file storage and document workflow platforms, bypassing traditional credential harvesting.

credential-access initial-access phishing oauth
2r 2t
high threat

M-Trends 2026: Evolving Threat Landscape

The M-Trends 2026 report highlights the increasing sophistication of threat actors, including voice phishing attacks targeting SaaS environments, ransomware groups actively destroying recovery capabilities, and espionage groups exploiting edge devices for persistent access, revealing a shift towards faster hand-offs between initial access brokers and ransomware deployers.

Scattered Spider +10 threat-report ransomware phishing saas
3r 10t
high advisory

Crunchyroll Data Breach via Telus Supply Chain Compromise

Crunchyroll suffered a data breach after a Telus employee was phished, leading to Okta credential theft and exfiltration of 100GB of customer data.

supply-chain data-breach credential-theft phishing
2r 3t 1i
high advisory

MOTW Bypass via CAB, TAR, and 7-Zip Chaining

A newly discovered Mark of the Web (MOTW) bypass technique utilizes a chain of CAB, TAR, and 7-Zip archives to circumvent SmartScreen and execute files without security warnings.

motw bypass phishing defense-evasion archive 7-zip cab tar
2r 2t 1i
medium advisory

NetNTLM Hash Phishing via Archive Extraction (CVE-2025-59284)

A phishing technique, potentially still viable due to incomplete patching, allows attackers to obtain NetNTLM hashes from archive extraction on Windows systems (CVE-2025-59284).

credential-access netntlm phishing windows
2r 1t
high advisory

Fileless Multi-Stage Remcos RAT via Phishing

A fileless multi-stage Remcos RAT is delivered via phishing, achieving memory-resident execution, but specific technical details are not provided in this brief.

remcos rat fileless phishing
2r 4t
high advisory

Phishing Campaign Abusing Google Cloud Storage Redirectors

A phishing campaign leverages Google Cloud Storage as a redirect layer to serve victims scam pages related to surveys, giveaways, rewards, alerts, and job lures, primarily hosted on .autos domains.

phishing redirect google-cloud-storage
2r 1t 2i
medium advisory

Detection of Downloaded URL Files Used in Phishing Campaigns

This detection rule identifies downloaded .url shortcut files on Windows systems, often used in phishing campaigns, by monitoring their creation events and flagging those from non-local sources, enabling early threat detection.

Elastic Defend phishing execution url-file windows
2r 3t
medium advisory

Detection of Downloaded Shortcut Files

This rule detects potentially malicious .lnk shortcut files downloaded from outside the local network on Windows systems, which are commonly used in phishing campaigns.

Elastic Defend phishing lnk execution windows
2r 3t
medium advisory

Suspicious Execution via Microsoft Office Add-Ins

This rule detects suspicious execution of Microsoft Office applications launching Office Add-Ins from unusual paths or with atypical parent processes, potentially indicating an attempt to gain initial access via a malicious phishing campaign.

Microsoft Office +5 office-addins phishing initial-access
3r 3t
medium advisory

Suspicious HTML File Creation Leading to Potential Payload Delivery

This detection identifies the creation of HTML files with high entropy and large size, followed by execution via a browser process, indicating potential HTML smuggling and malicious payload delivery on Windows systems.

Elastic Defend html-smuggling phishing initial-access windows evasion
3r 3t
high advisory

Okta FastPass Phishing Attempt Detection

Okta FastPass detected and prevented a phishing attempt, indicating a user was likely targeted with a credential harvesting attack.

Okta phishing fastpass
2r 1t
medium advisory

Microsoft 365 Suspicious Email Delivery

This brief outlines a threat where Microsoft Defender for Office 365 identifies an email as malicious or suspicious but still delivers it to a user's inbox or junk folder, potentially bypassing initial security measures.

Microsoft 365 suspicious-email phishing microsoft365
2r 2t
medium advisory

Detection of Office Macro File Creation

This brief outlines a threat involving the creation of new Office macro files, potentially indicating malicious activity such as phishing or malware distribution, targeting Windows systems.

Microsoft Office initial-access phishing macro
2r 1t
medium advisory

Suspicious MS Outlook Child Process

Detection of suspicious child processes spawned by Microsoft Outlook, indicative of spear phishing and malicious file execution leading to potential initial access and further exploitation.

Microsoft Outlook +3 initial-access phishing malware windows
2r 3t