{"id":28799,"date":"2026-05-06T00:39:53","date_gmt":"2026-05-06T00:39:53","guid":{"rendered":"https:\/\/www.europesays.com\/ai\/28799\/"},"modified":"2026-05-06T00:39:53","modified_gmt":"2026-05-06T00:39:53","slug":"breaking-the-code-multi-stage-code-of-conduct-phishing-campaign-leads-to-aitm-token-compromise","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/ai\/28799\/","title":{"rendered":"Breaking the code: Multi-stage \u2018code of conduct\u2019 phishing campaign leads to AiTM token compromise"},"content":{"rendered":"<p>\t\tIn this article<\/p>\n<p class=\"wp-block-paragraph\">Phishing campaigns continue to improve sophistication and refinement in blending social engineering, delivery and hosting infrastructure, and authentication abuse to remain effective against evolving security controls. A large-scale credential theft campaign observed by Microsoft Defender Research exemplifies this trend, using code of conduct-themed lures, a multi-step attack chain, and legitimate email services to distribute fully authenticated messages from attacker-controlled domains.<\/p>\n<p class=\"wp-block-paragraph\">The campaign targeted tens of thousands of users, primarily in the United States, and directed them through several stages of CAPTCHA and intermediate staging pages designed to reinforce legitimacy while filtering out automated defenses. The lures in this campaign used polished, enterprise-style HTML templates with structured layouts and preemptive authenticity statements, making them appear more credible than typical phishing emails and increasing their plausibility as legitimate internal communications. Because the messages contained concerning accusations and repeated time-bound action prompts, the campaign created a sense of urgency and pressure to act. \u00a0<\/p>\n<p class=\"wp-block-paragraph\">The attack chain ultimately led to a legitimate sign-in experience that was part of an <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/tag\/adversary-in-the-middle\/\" rel=\"nofollow noopener\" target=\"_blank\">adversary\u2011in\u2011the\u2011middle (AiTM) phishing<\/a> flow, which allowed the attackers to proxy the authentication session and capture authentication tokens that could provide immediate account access. Unlike traditional credential harvesting, AiTM attacks intercept authentication traffic in real time, bypassing non-phishing-resistant multifactor authentication (MFA).<\/p>\n<p class=\"wp-block-paragraph\">In this blog, we\u2019re sharing our analysis of this campaign\u2019s lures, infrastructure, and techniques. Organizations can defend against financial fraud initiated through phishing emails by educating users about phishing lures, investing in advanced anti-phishing solutions like <a href=\"https:\/\/www.microsoft.com\/security\/business\/siem-and-xdr\/microsoft-defender-office-365\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Microsoft Defender for Office 365<\/a> and configuring essential email security settings, and encouraging users to employ web browsers that support SmartScreen. Organizations can also enable network protection, which lets Windows use SmartScreen as a host-based web proxy.<\/p>\n<p>Multi-step social engineering campaign leading to credential theft<\/p>\n<p class=\"wp-block-paragraph\">Between April 14 and 16, 2026, the Microsoft Defender Research team observed a series of sophisticated phishing campaigns targeting more than 35,000 users across over 13,000 organizations in 26 countries, with majority of targets located in the United States (92%). The campaign did not focus on a single vertical but instead impacted a broad range of industries, most notably Healthcare &amp; life sciences (19%), Financial services (18%), Professional services (11%), and Technology &amp; software (11%). Messages were distributed in multiple distinct waves between 06:51 UTC on April 14 and 03:54 UTC on April 16.\u00a0<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.europesays.com\/ai\/wp-content\/uploads\/2026\/05\/Figure1-timeline.webp\" alt=\"Bar graph showing volume of messages sent by hour between April 14 and 16, 2026\" class=\"wp-image-147072 webp-format\"  data-orig-src=\"https:\/\/www.europesays.com\/ai\/wp-content\/uploads\/2026\/05\/Figure1-timeline.webp\"\/>Figure 1. Timeline of campaign messages sent by hour<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.europesays.com\/ai\/wp-content\/uploads\/2026\/05\/Figure2-geographic-industry-distribution.webp\" alt=\"Pie charts showing the breakdown of campaign recipients by country and industry.\" class=\"wp-image-147073 webp-format\"  data-orig-src=\"https:\/\/www.europesays.com\/ai\/wp-content\/uploads\/2026\/05\/Figure2-geographic-industry-distribution.webp\"\/>Figure 2. Campaign recipients by country and industry<\/p>\n<p class=\"wp-block-paragraph\">Emails in this campaign posed as internal compliance or regulatory communications, using display names such as \u201cInternal Regulatory COC\u201d, \u201cWorkforce Communications\u201d, and \u201cTeam Conduct Report\u201d. Subject lines included \u201cInternal case log issued under conduct policy\u201d and \u201cReminder: employer opened a non-compliance case log\u201d.<\/p>\n<p class=\"wp-block-paragraph\">Message bodies claimed that a \u201ccode of conduct review\u201d had been initiated, referenced organization-specific names embedded within the text, and instructed recipients to \u201copen the personalized attachment\u201d to review case materials. At the top of each message, a notice stated that the message had been \u201cissued through an authorized internal channel\u201d and that links and attachments had been \u201creviewed and approved for secure access\u201d, reinforcing the email\u2019s purported legitimacy. To further support the confidentiality of the supposed review, the end of each message contained a green banner stating that the contents had been encrypted using Paubox, a legitimate service associated with HIPAA-compliant communications.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.europesays.com\/ai\/wp-content\/uploads\/2026\/05\/Figure3-phishing-email.webp\" alt=\"Screenshot of sample phishing email\" class=\"wp-image-147074 webp-format\"  data-orig-src=\"https:\/\/www.europesays.com\/ai\/wp-content\/uploads\/2026\/05\/Figure3-phishing-email.webp\"\/>Figure 3. Sample phishing email<\/p>\n<p class=\"wp-block-paragraph\">Analysis of the sending infrastructure indicated that the campaign emails were sent using a legitime email delivery service, likely originating from a cloud-hosted Windows virtual machine. The messages were sent from multiple sender addresses using domains that are likely attacker-controlled.<\/p>\n<p class=\"wp-block-paragraph\">Each campaign email included a PDF attachment with filenames such as Awareness Case Log File \u2013 Tuesday 14th, April 2026.pdf and Disciplinary Action \u2013 Employee Device Handling Case.pdf. The attachment provided additional context about the supposed conduct review, including a summary of the review process and instructions for accessing supporting documentation. Recipients were directed to click a \u201cReview Case Materials\u201d link within the PDF, which initiated the credential harvesting flow.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.europesays.com\/ai\/wp-content\/uploads\/2026\/05\/Figure4-pdf-attachment-677x1024.webp\" alt=\"Screenshot of PDF attachment used in the campaign\" class=\"wp-image-147075 webp-format\"  data-orig-src=\"https:\/\/www.europesays.com\/ai\/wp-content\/uploads\/2026\/05\/Figure4-pdf-attachment-677x1024.webp\"\/>Figure 4. PDF attachment<\/p>\n<p class=\"wp-block-paragraph\">When clicked, users were initially directed to one of two attacker-controlled domains (for example, acceptable-use-policy-calendly[.]de or compliance-protectionoutlook[.]de). These landing pages displayed a Cloudflare CAPTCHA, presented as a mechanism to validate that the user was coming \u201cfrom a valid session\u201d. This CAPTCHA likely served as a gating mechanism to impede automated analysis and sandbox detonation.\u00a0<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.europesays.com\/ai\/wp-content\/uploads\/2026\/05\/Figure5-captcha.webp\" alt=\"Screenshot of captcha challenge. \" class=\"wp-image-147076 webp-format\" style=\"width:500px\"  data-orig-src=\"https:\/\/www.europesays.com\/ai\/wp-content\/uploads\/2026\/05\/Figure5-captcha.webp\"\/>Figure 5. CAPTCHA challenge<\/p>\n<p class=\"wp-block-paragraph\">After completing the CAPTCHA, users were redirected to an intermediate site designed to prepare them for the final stage of the attack. This page informed users that the requested documentation was encrypted and required account authentication. While this stage of the attack has several hallmarks of device code phishing, we were only able to confirm the AITM portion of the attack chain.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.europesays.com\/ai\/wp-content\/uploads\/2026\/05\/Figure6-intermediate-site.webp\" alt=\"Screenshot of intermediate site asking users to click review &amp; sign button\" class=\"wp-image-147077 webp-format\" style=\"width:500px\"  data-orig-src=\"https:\/\/www.europesays.com\/ai\/wp-content\/uploads\/2026\/05\/Figure6-intermediate-site.webp\"\/>Figure 6. Intermediate site asking users to click \u201cReview &amp; Sign\u201d<\/p>\n<p class=\"wp-block-paragraph\">After clicking the provided \u201cReview &amp; Sign\u201d button, users were presented with a sign-in prompt requesting their email address.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.europesays.com\/ai\/wp-content\/uploads\/2026\/05\/Figure7-prompt-enter-email-address.webp\" alt=\"Screenshot of prompt directing users to enter email address\" class=\"wp-image-147107 webp-format\" style=\"width:500px\"  data-orig-src=\"https:\/\/www.europesays.com\/ai\/wp-content\/uploads\/2026\/05\/Figure7-prompt-enter-email-address.webp\"\/>Figure 7. Prompt directing users to enter their email address<\/p>\n<p class=\"wp-block-paragraph\">After submission, users were required to complete a second CAPTCHA involving image selection.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.europesays.com\/ai\/wp-content\/uploads\/2026\/05\/Figure8-second-captcha.webp\" alt=\"Screenshot of second captcha challenge\" class=\"wp-image-147079 webp-format\" style=\"width:500px\"  data-orig-src=\"https:\/\/www.europesays.com\/ai\/wp-content\/uploads\/2026\/05\/Figure8-second-captcha.webp\"\/>Figure 8. Second CAPTCHA challenge<\/p>\n<p class=\"wp-block-paragraph\">Once these steps were completed, users were shown a message indicating that verification was successful and that their \u201ccase\u201d was being prepared.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.europesays.com\/ai\/wp-content\/uploads\/2026\/05\/Figure9-verification.webp\" alt=\"Screenshot of message telling users that verification completed successfully\" class=\"wp-image-147080 webp-format\"  data-orig-src=\"https:\/\/www.europesays.com\/ai\/wp-content\/uploads\/2026\/05\/Figure9-verification.webp\"\/>Figure 9. Message telling users that \u201cVerification completed successfully\u201d<\/p>\n<p class=\"wp-block-paragraph\">Following these steps, users were redirected to a third site hosting the final stage of the attack. Analysis of the underlying code indicates that the final destination varied depending on whether the user accessed the workflow from a mobile device or a desktop system.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.europesays.com\/ai\/wp-content\/uploads\/2026\/05\/Figure10-redirection-code.webp\" alt=\"Screenshot of code used to redirect users based on platform, whether mobile or dekstop\" class=\"wp-image-147081 webp-format\"  data-orig-src=\"https:\/\/www.europesays.com\/ai\/wp-content\/uploads\/2026\/05\/Figure10-redirection-code.webp\"\/>Figure 10. Code used to redirect users based on platform<\/p>\n<p class=\"wp-block-paragraph\">On the final page, users were informed that all materials related to their code of conduct review had been \u201csecurely logged\u201d, \u201ctime-stamped\u201d, and \u201cmaintained within the organization\u2019s centralized compliance tracking system\u201d. They were then prompted to schedule a time to discuss the case, which required signing in to their account.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.europesays.com\/ai\/wp-content\/uploads\/2026\/05\/Figure11-final-page.webp\" alt=\"screenshot of final page instructing users to sign in \" class=\"wp-image-147082 webp-format\"  data-orig-src=\"https:\/\/www.europesays.com\/ai\/wp-content\/uploads\/2026\/05\/Figure11-final-page.webp\"\/>Figure 11. Final page instructed users to sign in<\/p>\n<p class=\"wp-block-paragraph\">Selecting the \u201cSign in with Microsoft\u201d option redirected users to a Microsoft authentication page, initiating an AiTM session hijacking flow designed to capture authentication tokens and compromise user accounts.<\/p>\n<p>Mitigation and protection guidance<\/p>\n<p class=\"wp-block-paragraph\">Microsoft recommends the following mitigations to reduce the impact of this threat. Check the recommendations card for the deployment status of monitored mitigations.<\/p>\n<p><a href=\"https:\/\/learn.microsoft.com\/defender-office-365\/recommended-settings-for-eop-and-office365\" rel=\"nofollow noopener\" target=\"_blank\">Review the recommended settings<\/a> for Exchange Online Protection and Microsoft Defender for Office 365 to ensure your organization has established essential defenses and knows how to monitor and respond to threat activity.<\/p>\n<p>Invest in user awareness training and phishing simulations. <a href=\"https:\/\/learn.microsoft.com\/defender-office-365\/attack-simulation-training-get-started\" rel=\"nofollow noopener\" target=\"_blank\">Attack simulation training<\/a> in Microsoft Defender for Office 365, which also includes simulating phishing messages in Microsoft Teams, is one approach to running realistic attack scenarios in your organization.<\/p>\n<p><a href=\"https:\/\/learn.microsoft.com\/defender-office-365\/zero-hour-auto-purge\" rel=\"nofollow noopener\" target=\"_blank\">Enable Zero-hour auto purge (ZAP)<\/a> in Defender for Office 365 to quarantine sent mail in response to newly acquired threat intelligence and retroactively neutralize malicious phishing, spam, or malware messages that have already been delivered to mailboxes.<\/p>\n<p>Responders could also manually check for and purge unwanted emails containing URLs and\/or Subject fields that are similar, but not identical, to those of known bad messages. <a href=\"https:\/\/learn.microsoft.com\/defender-office-365\/threat-explorer-investigate-delivered-malicious-email\" rel=\"nofollow noopener\" target=\"_blank\">Investigate malicious email that was delivered in Microsoft 365<\/a> and use <a href=\"https:\/\/security.microsoft.com\/threatexplorer\" rel=\"nofollow noopener\" target=\"_blank\">Threat Explorer<\/a> to find and delete phishing emails.<\/p>\n<p>Turn on <a href=\"https:\/\/learn.microsoft.com\/defender-office-365\/safe-links-about\" rel=\"nofollow noopener\" target=\"_blank\">Safe Links<\/a> and <a href=\"https:\/\/learn.microsoft.com\/defender-office-365\/safe-attachments-about\" rel=\"nofollow noopener\" target=\"_blank\">Safe Attachments<\/a> in Microsoft Defender for Office 365.<\/p>\n<p>Enable <a href=\"https:\/\/learn.microsoft.com\/defender-endpoint\/enable-network-protection\" rel=\"nofollow noopener\" target=\"_blank\">network protection<\/a> in Microsoft Defender for Endpoint.<\/p>\n<p>Encourage users to use Microsoft Edge and other web browsers that support <a href=\"https:\/\/learn.microsoft.com\/deployedge\/microsoft-edge-security-smartscreen\" rel=\"nofollow noopener\" target=\"_blank\">Microsoft Defender SmartScreen<\/a>, which identifies and blocks malicious websites, including phishing sites, scam sites, and sites that host malware.<\/p>\n<p>Enable password-less authentication methods (for example, Windows Hello, FIDO keys, or Microsoft Authenticator) for accounts that support password-less. For accounts that still require passwords, use authenticator apps like Microsoft Authenticator for multifactor authentication (MFA). <a href=\"https:\/\/learn.microsoft.com\/entra\/identity\/authentication\/concept-authentication-methods\" rel=\"nofollow noopener\" target=\"_blank\">Refer to this article<\/a> for the different authentication methods and features.<\/p>\n<p>Configure <a href=\"https:\/\/learn.microsoft.com\/defender-xdr\/automatic-attack-disruption\" rel=\"nofollow noopener\" target=\"_blank\">automatic attack disruption<\/a> in Microsoft Defender XDR. Automatic attack disruption is designed to contain attacks in progress, limit the impact on an organization\u2019s assets, and provide more time for security teams to remediate the attack fully.<\/p>\n<p>Microsoft Defender detections<\/p>\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/www.microsoft.com\/security\/business\/microsoft-defender\" rel=\"nofollow noopener\" target=\"_blank\">Microsoft Defender<\/a> customers can refer to the list of applicable detections below. Microsoft Defender coordinates detection, prevention, investigation, and response across endpoints, identities, email, apps to provide integrated protection against attacks like the threat discussed in this blog.<\/p>\n<p>Tactic\u00a0Observed activity\u00a0Microsoft Defender coverage\u00a0Initial accessPhishing emails<a href=\"https:\/\/www.microsoft.com\/security\/business\/siem-and-xdr\/microsoft-defender-office-365\" rel=\"nofollow noopener\" target=\"_blank\">Microsoft Defender for Office 365<\/a> <br \/>\u2013 A potentially malicious URL click was detected <br \/>\u2013 A user clicked through to a potentially malicious URL <br \/>\u2013 Suspicious email sending patterns detected <br \/>\u2013 Email messages containing malicious URL removed after delivery <br \/>\u2013 Email messages removed after delivery <br \/>\u2013 Email reported by user as malware or phishPersistenceThreat actors sign in with stolen valid entities<a href=\"https:\/\/www.microsoft.com\/security\/business\/identity-access\/microsoft-entra-id-protection\" rel=\"nofollow noopener\" target=\"_blank\">Microsoft Entra ID Protection<\/a> <br \/>\u2013 Anomalous Token <br \/>\u2013 Unfamiliar sign-in properties <br \/>\u2013 Unfamiliar sign-in properties for session cookies \u00a0 <\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/business\/siem-and-xdr\/microsoft-defender-cloud-apps\" rel=\"nofollow noopener\" target=\"_blank\">Microsoft Defender for Cloud Apps<\/a> <br \/>\u2013 Impossible travel activity<\/p>\n<p>Microsoft Security Copilot<\/p>\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/ai-machine-learning\/microsoft-security-copilot\" rel=\"nofollow noopener\" target=\"_blank\">Microsoft Security Copilot<\/a> is <a href=\"https:\/\/learn.microsoft.com\/defender-xdr\/security-copilot-in-microsoft-365-defender\" rel=\"nofollow noopener\" target=\"_blank\">embedded in Microsoft Defender<\/a> and provides security teams with AI-powered capabilities to summarize incidents, analyze files and scripts, summarize identities, use guided responses, and generate device summaries, hunting queries, and incident reports.<\/p>\n<p class=\"wp-block-paragraph\">Customers can also <a href=\"https:\/\/learn.microsoft.com\/defender-xdr\/security-copilot-agents-defender\" rel=\"nofollow noopener\" target=\"_blank\">deploy AI agents<\/a>, including the following <a href=\"https:\/\/learn.microsoft.com\/copilot\/security\/agents-overview\" rel=\"nofollow noopener\" target=\"_blank\">Microsoft Security Copilot agents<\/a>, to perform security tasks efficiently:<\/p>\n<p class=\"wp-block-paragraph\">Security Copilot is also available as a <a href=\"https:\/\/learn.microsoft.com\/en-us\/copilot\/security\/experiences-security-copilot\" rel=\"nofollow noopener\" target=\"_blank\">standalone experience<\/a> where customers can perform specific security-related tasks, such as incident investigation, user analysis, and vulnerability impact assessment. In addition, Security Copilot offers <a href=\"https:\/\/learn.microsoft.com\/copilot\/security\/developer\/custom-agent-overview\" rel=\"nofollow noopener\" target=\"_blank\">developer scenarios<\/a> that allow customers to build, test, publish, and integrate AI agents and plugins to meet unique security needs.<\/p>\n<p>Threat intelligence reports<\/p>\n<p class=\"wp-block-paragraph\">Microsoft Defender XDR customers can use the following <a href=\"https:\/\/learn.microsoft.com\/defender-xdr\/threat-analytics\" rel=\"nofollow noopener\" target=\"_blank\">threat analytics<\/a> reports in the Defender portal (requires license for at least one Defender XDR product) to get the most up-to-date information about the threat actor, malicious activity, and techniques discussed in this blog. These reports provide the intelligence, protection information, and recommended actions to prevent, mitigate, or respond to associated threats found in customer environments.<\/p>\n<p class=\"wp-block-paragraph\">Microsoft Security Copilot customers can also use the <a href=\"https:\/\/learn.microsoft.com\/defender\/threat-intelligence\/security-copilot-and-defender-threat-intelligence?bc=%2Fsecurity-copilot%2Fbreadcrumb%2Ftoc.json&amp;toc=%2Fsecurity-copilot%2Ftoc.json#turn-on-the-security-copilot-integration-in-defender-ti\" rel=\"nofollow noopener\" target=\"_blank\">Microsoft Security Copilot integration<\/a> in Microsoft Defender Threat Intelligence, either in the Security Copilot standalone portal or in the <a href=\"https:\/\/learn.microsoft.com\/defender\/threat-intelligence\/using-copilot-threat-intelligence-defender-xdr\" rel=\"nofollow noopener\" target=\"_blank\">embedded experience<\/a> in the Microsoft Defender portal to get more information about this threat actor.<\/p>\n<p>Hunting queries<\/p>\n<p class=\"wp-block-paragraph\">Microsoft Defender XDR customers can run the following <a href=\"https:\/\/learn.microsoft.com\/defender-xdr\/advanced-hunting-overview\" rel=\"nofollow noopener\" target=\"_blank\">advanced hunting<\/a> queries to find related activity in their networks:<\/p>\n<p class=\"wp-block-paragraph\">Campaign emails by sender address<\/p>\n<p class=\"wp-block-paragraph\">The following query identifies emails associated with this campaign using a message\u2019s sending email address.<\/p>\n<p>EmailEvents<br \/>\n| where SenderMailFromAddress in (&#8221; cocpostmaster@cocinternal.com &#8220;,&#8221; nationaladmin@gadellinet.com &#8220;,&#8221;<br \/>\nnationalintegrity@harteprn.com\u201d,\u201d m365premiumcommunications@cocinternal.com\u201d,\u201d documentviewer@na.businesshellosign.de\u201d)<\/p>\n<p>Indicators of compromise<\/p>\n<p>IndicatorTypeDescriptionFirst seenLast seencompliance-protectionoutlook[.]deDomainDomain hosting malicious campaign content2026-04-142026-04-16acceptable-use-policy-calendly[.]deDomainDomain hosting malicious campaign content2026-04-142026-04-16cocinternal[.]comDomainDomain hosting sender email address2026-04-142026-04-16Gadellinet[.]comDomainDomain hosting sender email address2026-04-142026-04-16Harteprn[.]comDomainDomain hosting sender email address2026-04-142026-04-16Cocpostmaster[@]cocinternal.comEmail addressEmail address used to send campaign emails2026-04-142026-04-16Nationaladmin[@]gadellinet.comEmail addressEmail address used to send campaign emails2026-04-142026-04-16Nationalintegrity[@]harteprn.comEmail addressEmail address used to send campaign emails2026-04-142026-04-16M365premiumcommunications[@]cocinternal.comEmail addressEmail address used to send campaign emails2026-04-142026-04-16Documentviewer[@]na.businesshellosign.deEmail addressEmail address used to send campaign emails2026-04-142026-04-16Awareness Case Log File \u2013 Monday 13th, April 2026.pdfFilenameName of PDF attachment containing phishing link2026-04-142026-04-14Awareness Case Log File \u2013 Tuesday 14th, April 2026.pdfFilenameName of PDF attachment containing phishing link2026-04-152026-04-15Awareness Case Log File \u2013 Wednesday 15th, April 2026.pdfFilenameName of PDF attachment containing phishing link2026-04-162026-04-165DB1ECBBB2C90C51D81BDA138D4300B90EA5EB2885CCE1BD921D692214AECBC6SHA-256File hash of campaign PDF attachment2026-04-14 \u00a02026-04-16 \u00a0B5A3346082AC566B4494E6175F1CD9873B64ABE6C902DB49BD4E8088876C9EADSHA-256File hash of campaign PDF attachment2026-04-142026-04-1611420D6D693BF8B19195E6B98FEDD03B9BCBC770B6988BC64CB788BFABE1A49DSHA-256File hash of campaign PDF attachment2026-04-142026-04-16<\/p>\n<p>Learn more<\/p>\n<p class=\"wp-block-paragraph\">For the latest security research from the Microsoft Threat Intelligence community, check out the <a href=\"https:\/\/aka.ms\/threatintelblog\" rel=\"nofollow noopener\" target=\"_blank\">Microsoft Threat Intelligence Blog<\/a>. <\/p>\n<p class=\"wp-block-paragraph\">To get notified about new publications and to join discussions on social media, follow us on <a href=\"https:\/\/www.linkedin.com\/showcase\/microsoft-threat-intelligence\" rel=\"nofollow noopener\" target=\"_blank\">LinkedIn<\/a>, <a href=\"https:\/\/x.com\/MsftSecIntel\" rel=\"nofollow\">X (formerly Twitter)<\/a>, and <a href=\"https:\/\/bsky.app\/profile\/threatintel.microsoft.com\" rel=\"nofollow noopener\" target=\"_blank\">Bluesky<\/a>. <\/p>\n<p class=\"wp-block-paragraph\">To hear stories and insights from the Microsoft Threat Intelligence community about the ever-evolving threat landscape, listen to the <a href=\"https:\/\/thecyberwire.com\/podcasts\/microsoft-threat-intelligence\" rel=\"nofollow noopener\" target=\"_blank\">Microsoft Threat Intelligence podcast<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"In this article Phishing campaigns continue to improve sophistication and refinement in blending social engineering, delivery and hosting&hellip;\n","protected":false},"author":2,"featured_media":28800,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[18922,420,7853,416,8429,320,7852,5990],"class_list":{"0":"post-28799","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-microsoft","8":"tag-adversary-in-the-middle-aitm","9":"tag-azure","10":"tag-azure-copilot","11":"tag-copilot","12":"tag-credential-theft","13":"tag-microsoft","14":"tag-microsoft-copilot","15":"tag-phishing"},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts\/28799","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/comments?post=28799"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts\/28799\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/media\/28800"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/media?parent=28799"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/categories?post=28799"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/tags?post=28799"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}