35,000+
The Microsoft Threat Intelligence team has published a detailed report on a large-scale credential theft campaign that targeted over 35,000 users across 13,000 organizations. The attack, which occurred in waves from April 14-16, 2026, employed sophisticated social engineering lures themed around corporate 'code of conduct' policies. The attackers utilized an adversary-in-the-middle (AiTM) phishing architecture to proxy user authentication sessions in real-time, allowing them to steal valid session cookies and bypass even non-phishing-resistant multi-factor authentication (MFA). The campaign was highly targeted, with 92% of victims in the United States, and a focus on the healthcare, financial services, and professional services industries. This report serves as a critical reminder of the evolving nature of phishing attacks and the limitations of certain types of MFA.
The attack chain was multi-staged and designed to evade both automated security tools and user suspicion.
The use of an AiTM setup is the most critical technical aspect of this campaign. Unlike traditional phishing that just steals passwords, AiTM phishing defeats most forms of MFA, including SMS and authenticator app OTPs. It works by acting as a proxy between the victim and the real login service. The only forms of MFA that are resistant to this are phishing-resistant methods like FIDO2.
T1566.002 - Phishing: Spearphishing Link: The core of the attack relies on tricking users into clicking a malicious link.T1566.001 - Phishing: Spearphishing Attachment: The use of PDF attachments to deliver the link.T1189 - Drive-by Compromise: The user is led to a malicious site that facilitates the attack.T1539 - Steal Web Session Cookie: This is the primary technical goal of the AiTM attack, stealing the session token after a successful login.T1078 - Valid Accounts: The stolen session token provides the attacker with access to a valid, authenticated session.No specific Indicators of Compromise (IOCs) such as domains or IP addresses were provided in the source articles.
Security teams can hunt for AiTM activity by looking for suspicious sign-in patterns.
50126*--headless*User Geolocation Logon Pattern Analysis.New details on Microsoft's Q1 2026 email threat landscape, revealing 8.3 billion phishing threats, dominance of link-based attacks, and resilience of Phishing-as-a-Service platforms like Tycoon 2FA.
Crucially, implement *phishing-resistant* MFA, such as FIDO2, which is not vulnerable to AiTM attacks. This is the most effective mitigation.
Train users to identify and report sophisticated phishing lures and to be wary of unexpected requests for authentication.
Use web filtering and email security gateways to block access to known phishing domains and analyze links in real-time.
Use security solutions that can detect anomalous sign-in behavior, such as impossible travel or unfamiliar session properties, and block or challenge the authentication attempt.
The Microsoft campaign demonstrates the failure of non-phishing-resistant MFA. To counter AiTM attacks, organizations must prioritize the deployment of FIDO2-based authenticators (e.g., YubiKeys, Windows Hello for Business). FIDO2 binds the authentication to the hardware and the origin domain, making it impossible for an attacker to proxy the session from their own server. For services that don't support FIDO2, certificate-based authentication is another strong, phishing-resistant option. The goal is to move the entire organization away from interceptable methods like SMS OTPs, email codes, and simple app-based OTPs, which this attack proves are no longer sufficient against a determined adversary.
To detect the use of a stolen session token, security teams must analyze sign-in logs for geographic anomalies. Implement Azure AD Identity Protection and configure Conditional Access policies to leverage its risk detection capabilities. Specifically, enable and act on 'impossible travel' and 'unfamiliar sign-in properties' alerts. When a user authenticates, their session token is created. If an attacker on another continent immediately uses that token, it creates an impossible travel scenario. Configure policies to block access or force a password reset when such an event is detected. This provides a critical detection and response layer that can invalidate a stolen token before the attacker can do significant damage.
The large-scale AiTM phishing campaign begins.
The main waves of the phishing campaign conclude.
Microsoft publishes its detailed report on the campaign.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.