Threat IntelHIGH

Spear-Phishing Campaign Neutralizes MFA for Executives

Featured image for Spear-Phishing Campaign Neutralizes MFA for Executives
SCSC Media
Summary by CyberPings Editorial·AI-assisted·Reviewed by Rohit Rana
Ingested:
🎯

Basically, hackers are tricking executives into giving up their passwords and bypassing security measures.

Quick Summary

A new spear-phishing campaign is targeting senior executives, neutralizing MFA protections. This poses serious risks to corporate security. Organizations must enhance their defenses against such sophisticated threats.

What Happened

A highly sophisticated spear-phishing campaign has emerged, specifically targeting senior executives across various industries. This campaign, identified by Abnormal AI, utilizes advanced evasion techniques and a new phishing kit named VENOM. Active from November 2025 to March 2026, it primarily aims at corporate Microsoft 365 logins, effectively neutralizing multi-factor authentication (MFA).

Who's Affected

The campaign focuses on high-ranking officials, with 60% of targets holding C-level, president, or chairman titles. Notably, it does not discriminate by industry, impacting organizations across more than 20 sectors. This broad targeting amplifies the potential risks to corporate security.

How It Works

The attack begins with an email that mimics a SharePoint document-sharing notification. The sender's address is cleverly spoofed to resemble an internal email, such as sharepointadmin@[target’s domain]. This email contains a QR code crafted in HTML, avoiding detection by email security systems that scan for malicious images.

Once the victim scans the QR code, they are redirected to a page that verifies their identity through various checks, including user-agent screening and IP reputation checks. If successful, they are led to a fake login page that appears legitimate, complete with the target's organization logo.

Bypassing MFA

The campaign employs two primary methods to circumvent MFA protections:

  1. Adversary-in-the-Middle (AiTM): This technique intercepts and relays credentials and MFA approvals in real-time. The phishing page presents a realistic Microsoft login interface, capturing sensitive information directly.
  2. Device Code Abuse: This method exploits Microsoft’s device code authentication flow, tricking victims into submitting a code that grants attackers access to their accounts.

What You Should Do

Organizations can defend against such attacks by:

  • Restricting device code authentication flows unless necessary.
  • Monitoring MFA device registrations closely.
  • Implementing behavior-based email defenses that utilize AI to detect phishing attempts.

In case of an incident, it's crucial to revoke all active sessions and tokens to prevent unauthorized access, especially after password resets. The researchers emphasize the importance of vigilance in monitoring for suspicious activity related to MFA registrations, as these may appear in logs as "SoftwareTokenActivated" events.

Conclusion

As spear-phishing tactics evolve, organizations must enhance their defenses against these sophisticated threats. The emergence of the VENOM phishing kit highlights the need for continuous adaptation in security strategies to protect against high-stakes attacks targeting corporate leadership.

🔒 Pro insight: The use of the VENOM phishing kit signifies a troubling trend in targeted attacks, requiring immediate attention to executive security protocols.

Original article from

SCSC Media
Read Full Article

Related Pings

MEDIUMThreat Intel

Researchers Roast Cybercriminals to Diminish Their Glamour

Researchers are roasting cybercriminals to diminish their glamor. This humorous approach aims to expose their failures and fracture trust within criminal networks. It's a fresh take on cybersecurity, focusing on education and awareness.

The Register Security·
HIGHThreat Intel

Node.js Maintainers Targeted - Sophisticated Social Engineering Scheme

A coordinated social engineering scheme is targeting Node.js developers, risking the integrity of widely used software packages. This alarming trend highlights the need for vigilance in the open-source community.

Cyber Security News·
HIGHThreat Intel

Transparent Tribe Targets India's Startup Ecosystem - New Threat

Acronis reveals that Transparent Tribe is now targeting India's startup sector, especially cybersecurity firms. This shift raises concerns about espionage and data security risks. Startups must bolster their defenses against these sophisticated attacks.

CyberWire Daily·
HIGHThreat Intel

Gaming Industry - High-Stakes Cybersecurity Threats Explained

Cybercriminals are increasingly targeting the gaming industry, driven by financial transactions and sensitive data. As casinos go digital, understanding these threats is vital for operators to safeguard their assets.

Cyber Security News·
HIGHThreat Intel

China-Linked TA416 Targets European Governments with Phishing

TA416, a China-aligned threat actor, is targeting European governments with sophisticated phishing campaigns using PlugX malware. This poses significant risks to diplomatic security. Stay informed to safeguard your organization.

The Hacker News·
HIGHThreat Intel

US-Iran War - Risks of Attacking Nuclear Sites Explained

The US-Iran conflict escalates with airstrikes on nuclear sites. While no radiation leaks are reported, the risk of safety system failures could lead to catastrophic contamination across the Gulf. Experts warn of the potential environmental and public health impacts if critical systems are compromised.

Wired Security·