Accessibility links
  • Skip to main content
News Icon NEWS FILTER
All News Security Education Videos Scams & Phishing Your Security Mobile Security Identity Theft Corporate Security
Search Icon SEARCH
 

Email Icon SUBSCRIBE TO WEEKLY NEWSLETTER
Microsoft Warns of Growing Threat: New AiTM Phishing Techniques on the Rise
Facebook   X   LinkedIn   Email

Microsoft Warns of Growing Threat: New AiTM Phishing Techniques on the Rise

November 9, 2023

Microsoft recently issued a warning regarding the surge in adversary-in-the-middle (AiTM) phishing techniques, which have become increasingly prevalent in the phishing-as-a-service (PhaaS) cybercrime model. This worrisome trend is exacerbated by the incorporation of AiTM capabilities into existing phishing services. So, let’s figure out what this means and how you can avoid being in the middle of one of these attacks.

An AiTM, or man-in-the-middle (MiTM) attack, is a cyberattack where an attacker covertly intercepts communication between two parties who believe they are having a secure conversation. This interception allows the attacker to gain unauthorized access, eavesdrop, and pilfer sensitive information being exchanged. Often, those performing these attacks hijack the connection from those working in public locations, such as the café on the corner.

What to do, what to do? Well, one thing you can do is not perform sensitive actions from a public WiFi connection. Instead, use a VPN to secure that line or wait until you are using a trusted location to perform sensitive tasks. Next, always keep the peepers open for phishing. Don’t click unexpected links or attachments and don’t reply to the sender if you’re unsure what is in a message. Finally, don’t react to “urgent” messages without taking a second to consider if they’re phishing you.

In a recent X post, the Microsoft Threat Intelligence team noted that this evolution in the PhaaS landscape enables cybercriminals to conduct large-scale phishing campaigns aimed at getting around multi-factor authentication (MFA) safeguards. These campaigns are particularly concerning because they can target a wide audience; in this case specifically, those using Microsoft products, which is no small number.

This rise in AiTM-capable phishing services poses a severe risk to organizations and individuals alike. Microsoft's warning serves as a reminder of the evolving tactics employed by cybercriminals and underscores the importance of robust cybersecurity measures, user training, and ongoing vigilance by everyone to protect against these sophisticated threats.


Phony Voicemail Links Steal Employee Credentials From Office 365 And Outlook Users

Scams & Phishing

Phony Voicemail Links Steal Employee Credentials From Office 365 And Outlook Users

Most of us know phishing emails and fake texts are a hacker’s calling card for stealing valuable PII. But recently, researchers at Zscaler cloud security sounded the alarm about an unusual malware campaign using voicemail-themed email phishing as the primary hook for cyberattacks. It’s only after Zscaler fell victim to this campaign that the company felt compelled to study it further. Zscaler finds this cybercrime targets employees in the U.S. using Microsoft Office 365 and the Outlook email service. READ FULL STORY

Malware Downloads From Harmless Word Document

Scams & Phishing

Malware Downloads From Harmless Word Document

You have heard it over and over and likely, your reaction is “Yes, I know. Don’t enable macros in Microsoft documents or spreadsheets.” Well, don’t plug your ears or turn away, but you’re about to hear it again…only for a new reason. Some who have less than great intentions have figured out a way to get those macros enabled using a seemingly harmless Microsoft Word document (.doc). So now, even if you have them disabled by default, someone has found a way to get those enabled for you; like it or not. READ FULL STORY

Microsoft Uncovers Multi-Stage AiTM Phishing and BEC Attacks Targeting Financial Organizations

Corporate Security

Microsoft Uncovers Multi-Stage AiTM Phishing and BEC Attacks Targeting Financial Organizations

Microsoft has recently identified a series of sophisticated adversary-in-the-middle (AiTM) phishing and business email compromise (BEC) attacks aimed at banking and financial services institutions. It found that the attackers initially compromised a trusted vendor, subsequently launching AiTM attacks and follow-on BEC activities against multiple organizations. While similar to the well-known man-in-the-middle attack, it's a little bit different. READ FULL STORY








Close
Fraud News & Alerts!

Keep up with the latest cyber security news through our weekly Fraud News & Alerts updates. Each week you will receive an email containing the latest cyber security news, tips and breach notifications.



You're all set!

You will receive your first official security update email within the next week.

A welcome email has also just been sent to you. If you do not receive this email within the next few minutes, please check your Junk box or spam filter to confirm our emails are not being blocked.


 
Help  
Enter any word or words you like.        

The email newsletter will arrive from news@stickleyonsecurity.com


Loading
Please wait...