Skip to content
OnMSFT.com
  • Home
  • About
  • Contact
  • Windows
  • Surface
  • Xbox
  • How-To
  • OnPodcast
  • Edge
  • Teams
  • Gaming
Menu
  • Home
  • About
  • Contact
  • Windows
  • Surface
  • Xbox
  • How-To
  • OnPodcast
  • Edge
  • Teams
  • Gaming
  1. Home
  2. News
  3. 100K+ VIP Microsoft 365 users got targeted by phishers

100K+ VIP Microsoft 365 users got targeted by phishers

Devesh Beri Devesh Beri
August 10, 2023
2 min read

In this article

  • Phase 1 – EvilProxy in Action
  • Phase 2 – Account Compromise
  • Phase 3 – Post-Compromise Exploitation

The EvilProxy platform operates as a phishing service, targeting MFA-protected accounts, leading to a rise in successful cloud account takeovers. Recent data reveals its widespread use, with researchers identifying over 100,000+ phishing emails dispatched to steal Microsoft 365 accounts.

It uses reverse proxies to execute phishing attacks, intercepting authentication requests and user credentials. Through this, it seizes authentication cookies during login, enabling attackers to surpass multiple security challenges.

Phase 1 – EvilProxy in Action

Phishing emails leverage reputable brands like Adobe, DocuSign, and Concur to deceive recipients. Clicking these links initiates a multi-step process, evading detection. Ultimately, victims encounter a counterfeit Microsoft 365 login page, an EvilProxy phishing page.

Attackers evade detection by encoding email addresses, decoding them via compromised legitimate websites, and redirecting users to organization-specific phishing pages.

Phase 2 – Account Compromise

The attackers carefully choose which cases to pursue, prioritizing high-ranking individuals or VIP targets due to their access to sensitive data while ignoring those lower in the hierarchy. Compromised targets include:

  • C-level executives.
  • CEOs.
  • Vice presidents.
  • Chief financial officers.
  • Employees with access to financial assets or sensitive information.

Attackers may prioritize users based on publicly available organizational information.

Phase 3 – Post-Compromise Exploitation

After gaining access, attackers establish a foothold in the cloud environment. They manipulate MFA via native Microsoft 365 applications. Then the attacker’s MFA method is added post-compromise, ensuring persistent access.

This manipulation includes adding an “Authenticator App with Notification and Code.” They explore lateral movement, study organizational processes, and may engage in financial fraud or data exfiltration.

To counter these threats, organizations should enhance employee security awareness, enforce rigorous email filtering, and consider adopting FIDO-based physical keys for stronger authentication.

via BleepingComputer

Related

Share this article:
Previous Article New cars and tracks revealed for upcoming Forza Motorsport reboot Next Article Latest Take-Two earnings call suggests GTA VI to arrive in 2024

Related Articles

Denis Dyack calls NVIDIA DLSS 5 a mistake, warns it changes game art direction and could harm AAA game development future.

DLSS 5 “Needs to Go Back to the Drawing Board,” Eternal Darkness Dev Says

March 21, 2026

Crimson Desert players spot possible AI-generated art after launch

March 21, 2026

Chrome is adding a scanning animation and ‘Checking download for safety’ message for risky downloads

March 21, 2026

Leave a Comment Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • DLSS 5 “Needs to Go Back to the Drawing Board,” Eternal Darkness Dev Says
  • Crimson Desert players spot possible AI-generated art after launch
  • Chrome is adding a scanning animation and ‘Checking download for safety’ message for risky downloads
  • Microsoft says Windows 11 will get faster, quieter, and more customizable
  • LGA-1954 Could Bring Multi-Generation Support to Intel CPUs

Recent Comments

No comments to show.
OnMSFT.com

The Tech News Site

Categories

  • Windows
  • Surface
  • Xbox
  • How-To
  • OnPodcast
  • Gaming
  • Edge
  • Teams

Recent Posts

  • DLSS 5 “Needs to Go Back to the Drawing Board,” Eternal Darkness Dev Says
  • Crimson Desert players spot possible AI-generated art after launch
  • Chrome is adding a scanning animation and 'Checking download for safety' message for risky downloads
  • Microsoft says Windows 11 will get faster, quieter, and more customizable
  • LGA-1954 Could Bring Multi-Generation Support to Intel CPUs

Quick Links

  • About OnMSFT.com
  • Contact OnMSFT
  • Join Our Team
  • Privacy Policy
© 2010–2026 OnMSFT.com LLC. All rights reserved.
About OnMSFT.comContact OnMSFTPrivacy Policy