Microsoft Uncovers Sophisticated Phishing Campaign Hitting 35,000 Users Globally

Microsoft Details Phishing Campaign Targeting 35,000 Users

HIGH
May 5, 2026
May 6, 2026
5m read
PhishingCyberattackThreat Intelligence

Impact Scope

People Affected

35,000+

Industries Affected

HealthcareFinanceTechnology

Geographic Impact

United States (global)

Related Entities(initial)

Organizations

Full Report(when first published)

Executive Summary

The Microsoft Threat Intelligence team has published a detailed report on a large-scale credential theft campaign that targeted over 35,000 users across 13,000 organizations. The attack, which occurred in waves from April 14-16, 2026, employed sophisticated social engineering lures themed around corporate 'code of conduct' policies. The attackers utilized an adversary-in-the-middle (AiTM) phishing architecture to proxy user authentication sessions in real-time, allowing them to steal valid session cookies and bypass even non-phishing-resistant multi-factor authentication (MFA). The campaign was highly targeted, with 92% of victims in the United States, and a focus on the healthcare, financial services, and professional services industries. This report serves as a critical reminder of the evolving nature of phishing attacks and the limitations of certain types of MFA.

Threat Overview

The attack chain was multi-staged and designed to evade both automated security tools and user suspicion.

  1. Initial Lure: The campaign began with phishing emails sent from attacker-controlled domains using a legitimate email delivery service. The emails impersonated internal HR or compliance departments and contained urgent 'code of conduct' notifications.
  2. Evasion: The emails contained PDF attachments with links, rather than links in the email body, to bypass some scanners. The attack flow also incorporated CAPTCHA challenges to hinder automated analysis.
  3. Redirection: The link directed the user through a series of redirects, which varied the final landing page based on whether the user was on a desktop or mobile device.
  4. AiTM Phishing: The victim was ultimately presented with a convincing, pixel-perfect replica of their organization's sign-in page. This page was not a simple credential harvester; it was an AiTM proxy. When the user entered their credentials and satisfied the MFA prompt, the AiTM server intercepted the authentication flow in real-time, captured the resulting session token (cookie), and forwarded it to the attacker.
  5. Account Takeover: With the stolen session token, the attacker could gain immediate access to the user's account (e.g., Office 365, Outlook) without needing the password or to re-authenticate, effectively bypassing the MFA.

Technical Analysis

The use of an AiTM setup is the most critical technical aspect of this campaign. Unlike traditional phishing that just steals passwords, AiTM phishing defeats most forms of MFA, including SMS and authenticator app OTPs. It works by acting as a proxy between the victim and the real login service. The only forms of MFA that are resistant to this are phishing-resistant methods like FIDO2.

  • Targeting: 92% of targets were in the United States.
  • Top Affected Industries: Healthcare and life sciences (19%), financial services (18%), and professional services (11%).
  • Trending Threat: Microsoft's report also noted a 146% increase in QR code phishing (quishing) attacks from January to March 2026, indicating another rapidly growing vector for credential theft.

MITRE ATT&CK Mapping

Impact Assessment

  • Account Compromise: Successful attacks lead to full account takeover, giving attackers access to sensitive emails, files, and corporate resources.
  • Data Exfiltration: Attackers can exfiltrate sensitive data from compromised mailboxes and cloud storage (e.g., SharePoint, OneDrive).
  • Business Email Compromise (BEC): A compromised account is often used as a launchpad for internal phishing or BEC attacks, abusing the trust associated with the legitimate account.
  • Lateral Movement: Attackers can use the access to search for information or credentials that allow them to move to other systems within the network.

IOCs — Directly from Articles

No specific Indicators of Compromise (IOCs) such as domains or IP addresses were provided in the source articles.

Cyber Observables — Hunting Hints

Security teams can hunt for AiTM activity by looking for suspicious sign-in patterns.

Type
Log Source
Value
Azure AD Sign-in Logs
Description
Look for sign-ins where the IP address, ISP, or User-Agent string is inconsistent with the user's known profile.
Type
Event ID
Value
Azure AD Event 50126
Description
Error code indicating a failed authentication due to a user not completing the MFA prompt, which can occur during AiTM attempts.
Type
Command Line Pattern
Value
*--headless*
Description
AiTM phishing kits often use headless browsers on the server side to render the login pages. Looking for this in server logs could be an indicator.

Detection & Response

  1. Analyze Sign-in Logs: Regularly audit Azure AD (Entra ID) sign-in logs for anomalies. Look for successful sign-ins from geographically impossible locations (e.g., a user logging in from the US and then 10 minutes later from a different continent). Reference D3FEND's User Geolocation Logon Pattern Analysis.
  2. Conditional Access Policies: Implement strict Conditional Access policies in Azure AD that block sign-ins from non-compliant devices, untrusted locations, or those that exhibit signs of risk.
  3. Token Theft Detection: Leverage Microsoft 365 Defender and Defender for Cloud Apps, which have built-in detections for suspicious session cookie activity and AiTM phishing.

Mitigation

  1. Phishing-Resistant MFA: This is the most important mitigation. Mandate the use of phishing-resistant MFA, such as FIDO2 security keys or certificate-based authentication. These methods cryptographically bind the authentication session to the user's device, which AiTM attacks cannot proxy.
  2. User Training: Continuously train users to be suspicious of unexpected emails, especially those creating a sense of urgency or related to HR/compliance. Teach them to verify such requests through a separate communication channel.
  3. Email Security: Implement advanced email security solutions that can analyze links and attachments in real-time and block known phishing infrastructure.
  4. Limit Session Lifetimes: Reduce the lifetime of session tokens. While this doesn't prevent theft, it reduces the window of opportunity for an attacker to use a stolen token.

Timeline of Events

1
April 14, 2026
The large-scale AiTM phishing campaign begins.
2
April 16, 2026
The main waves of the phishing campaign conclude.
3
May 4, 2026
Microsoft publishes its detailed report on the campaign.
4
May 5, 2026
This article was published

Article Updates

May 6, 2026

New details on Microsoft's Q1 2026 email threat landscape, revealing 8.3 billion phishing threats, dominance of link-based attacks, and resilience of Phishing-as-a-Service platforms like Tycoon 2FA.

MITRE ATT&CK Mitigations

Crucially, implement *phishing-resistant* MFA, such as FIDO2, which is not vulnerable to AiTM attacks. This is the most effective mitigation.

Train users to identify and report sophisticated phishing lures and to be wary of unexpected requests for authentication.

Use web filtering and email security gateways to block access to known phishing domains and analyze links in real-time.

Use security solutions that can detect anomalous sign-in behavior, such as impossible travel or unfamiliar session properties, and block or challenge the authentication attempt.

D3FEND Defensive Countermeasures

The Microsoft campaign demonstrates the failure of non-phishing-resistant MFA. To counter AiTM attacks, organizations must prioritize the deployment of FIDO2-based authenticators (e.g., YubiKeys, Windows Hello for Business). FIDO2 binds the authentication to the hardware and the origin domain, making it impossible for an attacker to proxy the session from their own server. For services that don't support FIDO2, certificate-based authentication is another strong, phishing-resistant option. The goal is to move the entire organization away from interceptable methods like SMS OTPs, email codes, and simple app-based OTPs, which this attack proves are no longer sufficient against a determined adversary.

To detect the use of a stolen session token, security teams must analyze sign-in logs for geographic anomalies. Implement Azure AD Identity Protection and configure Conditional Access policies to leverage its risk detection capabilities. Specifically, enable and act on 'impossible travel' and 'unfamiliar sign-in properties' alerts. When a user authenticates, their session token is created. If an attacker on another continent immediately uses that token, it creates an impossible travel scenario. Configure policies to block access or force a password reset when such an event is detected. This provides a critical detection and response layer that can invalidate a stolen token before the attacker can do significant damage.

Timeline of Events

1
April 14, 2026

The large-scale AiTM phishing campaign begins.

2
April 16, 2026

The main waves of the phishing campaign conclude.

3
May 4, 2026

Microsoft publishes its detailed report on the campaign.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

PhishingAiTMAdversary-in-the-MiddleMicrosoftMFACredential TheftQR Code Phishing

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.