New Blog Post | Cookie theft to BEC: Attackers use AiTM phishing sites as entry point to fin. fraud

Microsoft

Figure1-overview-of-aitm-phishing.png

From cookie theft to BEC: Attackers use AiTM phishing sites as entry point to further financial frau...

 

A large-scale phishing campaign that used adversary-in-the-middle (AiTM) phishing sites stole passwords, hijacked a user’s sign-in session, and skipped the authentication process even if the user had enabled multifactor authentication (MFA). The attackers then used the stolen credentials and session cookies to access affected users’ mailboxes and perform follow-on business email compromise (BEC) campaigns against other targets. Based on our threat data, the AiTM phishing campaign attempted to target more than 10,000 organizations since September 2021.

0 Replies