Defending Against AitM Phishing: A Comprehensive Guide to the Latest Campaign Targeting US Enterprises

By • min read

Overview

In early 2025, cybersecurity researchers identified a sophisticated phishing campaign specifically aimed at US organizations. The attacks leverage Adversary-in-the-Middle (AitM) techniques to bypass multi-factor authentication (MFA) and steal credentials. Emails disguised as official conduct reports lure recipients to a fake Microsoft login page that captures both passwords and session tokens. This guide provides a detailed breakdown of the attack, step-by-step instructions for security teams to detect and mitigate it, and common pitfalls to avoid.

Defending Against AitM Phishing: A Comprehensive Guide to the Latest Campaign Targeting US Enterprises
Source: www.securityweek.com

The campaign is notable for its precision targeting, use of legitimate-looking domains, and real-time credential harvesting—making it a significant threat to enterprise security. Understanding the mechanics is essential for any organization using Microsoft 365 or Azure AD.

Prerequisites

Before diving into the tutorial, ensure you have the following:

Step-by-Step Instructions

1. Recognizing the Phishing Email

The initial email appears to come from an internal HR or compliance department. The subject line often includes “Conduct Report” or “Violation Notification.” Key characteristics:

Action: Train users to hover over links without clicking. Check the full URL in the status bar. Any mismatch with the displayed text is a red flag.

2. Analyzing the Link with AitM Infrastructure

Once a user clicks, they are redirected to a phishing page that mimics the Microsoft online login (e.g., login.microsoftonline.com). But unlike classic phishing, this page uses an AitM proxy. The attacker’s server sits between the victim and Microsoft’s actual login server. Step-by-step breakdown:

  1. The phishing page forwards the victim’s credentials to the real Microsoft login endpoint.
  2. When Microsoft sends a MFA challenge (e.g., push to authenticator app, SMS code), the proxy captures both the password and the session token (not just a static password).
  3. The attacker then uses the session token to access the victim’s account, bypassing MFA completely.

Detection: Use tools like PhishLabs or Cybersecurity & Infrastructure Security Agency (CISA) guidelines. Check the page source for unusual JavaScript that intercepts form data and sends it to a remote server.

3. Identifying the Fake Login Page

The URL of the phishing page is often a homograph attack (e.g., using a Cyrillic character that looks like an ASCII letter) or a subdomain of a legitimate-looking domain (e.g., login.microsoft.com.security-check[.]com). Look for:

Tool: Use URLScan.io to scan the link and see if it has been reported as malicious.

Defending Against AitM Phishing: A Comprehensive Guide to the Latest Campaign Targeting US Enterprises
Source: www.securityweek.com

4. Defensive Measures for Organizations

To protect against AitM phishing, implement a layered approach:

5. Incident Response Steps

If a user reports clicking a suspicious link:

  1. Isolate the user’s session: Force logout from all sessions via Azure AD admin center.
  2. Reset credentials: Change password and revoke tokens.
  3. Check for lateral movement: Examine logs for unusual mailbox access, forwarding rules, or access to sensitive documents.
  4. Report the domain: Submit to Microsoft (via reportphishing) and to CISA.

Common Mistakes

Summary

This sophisticated phishing campaign using AitM techniques poses a serious threat to US organizations by bypassing MFA through real-time credential harvesting. To defend, organizations must combine technical controls (enhanced MFA, conditional access, email filtering) with ongoing user education. Immediate incident response steps include session revocation and credential reset. By understanding the attack flow and common mistakes, security teams can significantly reduce risk.

Recommended

Discover More

Mastering Now California’s cops can give tickets to driverless carssv3688 Crucial Updates on Google's Project Toscana: Why the Pixel 11's Face ID Rival May Be Delayedsv368Go 1.26 Launches Revamped 'go fix' to Automate Code Modernizationhit88s6666hit88AI Coding Agents Now Fully Automate Cloudflare Onboarding and Domain Deployment in Partnership with Stripe10 Things You Need to Know About GeForce NOW's May Cloud Gaming Bonanzas6666ae388ae388181bet181bet