Security

AiTM Phishing Campaign Targets Microsoft 365 Users

3 min read

Summary

Microsoft has detailed a large-scale adversary-in-the-middle (AiTM) phishing campaign that used fake code-of-conduct investigations to steal authentication tokens. The attack combined polished social engineering, staged CAPTCHA pages, and a legitimate Microsoft sign-in flow, highlighting why phishing-resistant protections and stronger email defenses matter.

Need help with Security?Talk to an Expert

Introduction

Microsoft has uncovered a sophisticated phishing campaign that targeted more than 35,000 users across over 13,000 organizations in 26 countries. For Microsoft 365 and security administrators, this matters because the attack used an adversary-in-the-middle (AiTM) technique to capture authentication tokens, which can bypass non-phishing-resistant MFA and give attackers immediate account access.

What’s new

Between April 14 and 16, 2026, Microsoft observed a multi-stage phishing operation using code of conduct and internal compliance lures. The messages were designed to look like legitimate internal communications and were sent in authenticated emails from attacker-controlled domains via a legitimate email delivery service.

Key characteristics of the campaign included:

  • Polished compliance-themed emails with urgent subject lines about employee misconduct or non-compliance cases
  • PDF attachments that instructed recipients to review case materials
  • Multiple staged pages including CAPTCHA checks and intermediary “verification” steps
  • A final Microsoft sign-in prompt embedded in an AiTM flow to intercept session tokens
  • Broad impact across industries, especially Healthcare, Financial Services, Professional Services, and Technology

Microsoft said most victims were in the United States, but the campaign affected organizations globally.

Why this attack is significant

Unlike basic credential phishing, AiTM attacks proxy the authentication session in real time. That means even when users complete MFA, attackers may still capture tokens and reuse them to access accounts.

This campaign also shows how phishing tactics are evolving:

  • Attackers used enterprise-style HTML templates to improve credibility
  • They leveraged time pressure and HR-style accusations to push fast action
  • CAPTCHA and staging pages helped filter automated security analysis
  • The final sign-in flow looked legitimate enough to reduce user suspicion

Impact on IT administrators

Security teams should treat this as a reminder that user awareness alone is not enough. Organizations need layered defenses across email, identity, endpoint, and web protection.

Administrators should review:

  • Exchange Online Protection and Microsoft Defender for Office 365 configurations
  • Anti-phishing policies and impersonation protections
  • SmartScreen support in managed browsers
  • Network protection in Windows to block malicious web destinations
  • Detection and response coverage for suspicious sign-in activity and token abuse

IT teams should take the following actions:

  1. Educate users about HR, compliance, and regulatory phishing lures
  2. Run phishing simulations with Microsoft Defender for Office 365 attack simulation training
  3. Harden email security settings and review policy recommendations in the Microsoft security portal
  4. Prioritize phishing-resistant authentication where possible
  5. Hunt for indicators of compromise and investigate unusual session behavior tied to sign-in events

This campaign reinforces a key security lesson: modern phishing is no longer just about passwords. Defending against token theft requires stronger identity protections, better email security, and continuous user education.

Need help with Security?

Our experts can help you implement and optimize your Microsoft solutions.

Talk to an Expert

Stay updated on Microsoft technologies

AiTM phishingMicrosoft 365 securitytoken theftMicrosoft Defender for Office 365phishing campaign

Related Posts

Security

ClickFix macOS Campaign Delivers Infostealers

Microsoft has identified a new ClickFix-style campaign targeting macOS users with fake troubleshooting and utility instructions hosted on blogs and content platforms. Instead of downloading apps, victims are tricked into running Terminal commands that bypass typical macOS app checks and deploy infostealers such as Macsync, SHub Stealer, and AMOS.

Security

CVE-2026-31431 Linux Root Escalation Threat Explained

Microsoft has detailed CVE-2026-31431, a high-severity Linux local privilege escalation flaw that can grant root access across major distributions and cloud-hosted workloads. The issue matters because it affects shared-kernel environments such as containers and Kubernetes, increasing the risk of container escape, lateral movement, and host compromise if systems are not patched quickly.

Security

Microsoft Agent 365 GA Adds Security and AI Controls

Microsoft Agent 365 is now generally available for commercial customers, giving IT and security teams a unified control plane to observe, govern, and secure AI agents across Microsoft 365, endpoints, and cloud environments. New preview capabilities also extend visibility to shadow AI, local Windows agents, multicloud agent platforms, and policy-based controls through Defender and Intune.

Security

Email Threat Landscape Q1 2026: Key Microsoft Insights

Microsoft reports 8.3 billion phishing emails detected in Q1 2026, with QR code phishing more than doubling and CAPTCHA-gated campaigns evolving quickly. The findings matter for security teams because attackers are shifting toward link-based credential theft, while disruption efforts against Tycoon2FA show coordinated action can reduce phishing impact.

Security

Microsoft Security Updates: Agent 365 and Defender

Microsoft has announced new security capabilities across Agent 365, Defender for Cloud, GitHub Advanced Security, and Microsoft Purview. The updates focus on improving visibility into AI agent activity, strengthening code-to-runtime protection, and accelerating data security investigations for security and IT teams.

Security

CISO Risk Reviews: 8 Microsoft Security Best Practices

Microsoft has published a practical framework for CISOs and security leaders to run more effective risk reviews amid rising AI-enabled cyberthreats. The guidance focuses on eight review areas—from assets and applications to authentication, authorization, and network isolation—to help organizations shift from reactive response to proactive risk reduction.