Close Menu

    Subscribe to Updates

    Get the latest Tech news from SynapseFlow

    What's Hot

    Microsoft Warns of Sophisticated Phishing Campaign Targeting US Organizations

    May 5, 2026

    NASA Volunteers Double Known Population of Brown Dwarfs

    May 5, 2026

    A variant of the Xiaomi 18 Ultra may use the Xring O3, Xiaomi’s upcoming in-house chipset

    May 5, 2026
    Facebook X (Twitter) Instagram
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    Facebook X (Twitter) Instagram YouTube
    synapseflow.co.uksynapseflow.co.uk
    • AI News & Updates
    • Cybersecurity
    • Future Tech
    • Reviews
    • Software & Apps
    • Tech Gadgets
    synapseflow.co.uksynapseflow.co.uk
    Home»Cybersecurity»Microsoft Warns of Sophisticated Phishing Campaign Targeting US Organizations
    Microsoft Warns of Sophisticated Phishing Campaign Targeting US Organizations
    Cybersecurity

    Microsoft Warns of Sophisticated Phishing Campaign Targeting US Organizations

    The Tech GuyBy The Tech GuyMay 5, 2026No Comments3 Mins Read0 Views
    Share
    Facebook Twitter LinkedIn Pinterest Email
    Advertisement


    Microsoft has warned organizations in the United States about a sophisticated phishing campaign that uses a “code of conduct review” theme to lure victims to a malicious website.

    Advertisement

    The tech giant observed more than 35,000 attempts between April 14 and 16. The malicious emails were received by users across roughly 13,000 organizations in 26 countries, but 92% of the targets were in the US. 

    Many of the messages were received by users in the healthcare and life sciences, financial services, professional services, and technology and software sectors.

    Microsoft phishing email

    The phishing emails purport to be internal regulatory or compliance messages, with display names such as ‘Team Conduct Report’, ‘Workforce Communications’, and ‘Internal Regulatory COC’, and subject lines such as ‘Reminder: employer opened a non-compliance case log’ and ‘Internal case log issued under conduct policy’.

    “Analysis of the sending infrastructure indicated that the campaign emails were sent using a legitimate email delivery service, likely originating from a cloud-hosted Windows virtual machine. The messages were sent from multiple sender addresses using domains that are likely attacker-controlled,” Microsoft explained. 

    The recipient is instructed to open a personalized attachment to review case materials. The attachments are PDF documents titled ‘Awareness Case Log File’ or ‘Disciplinary Action’ that direct the user to click the ‘Review Case Materials’ link within the document. 

    When the link is clicked, the user is taken to a Cloudflare CAPTCHA page, which Microsoft believes serves as a gating mechanism against automated analysis. The victim is then directed to a page stating that the documents need to be reviewed and signed. 

    Advertisement. Scroll to continue reading.

    The victim is then taken to a page where they are instructed to enter their email address, followed by a second CAPTCHA page. The user is then told that the verification has been successfully completed and is asked to sign in to their Microsoft account. 

    This last step of the attack involves adversary-in-the-middle (AitM) phishing, in which the attacker proxies the session to capture authentication tokens and gain immediate access to the targeted account.

    “Unlike traditional credential harvesting, AiTM attacks intercept authentication traffic in real time, bypassing non-phishing-resistant multifactor authentication (MFA),” Microsoft noted.

    Enterprises at risk of being targeted in this and similar phishing campaigns have been provided with recommendations for mitigating attacks, as well as threat-hunting queries and indicators of compromise (IoCs).

    Related: New Bluekit Phishing Kit Features AI Assistant

    Related: Robinhood Vulnerability Exploited for Phishing Attacks

    Related: Tycoon 2FA Loses Phishing Kit Crown Amid Surge in Attacks

    Advertisement
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    The Tech Guy
    • Website

    Related Posts

    MetInfo, Weaver E-cology Vulnerabilities in Attackers’ Crosshairs

    May 5, 2026

    Trellix Source Code Repository Breached

    May 5, 2026

    Cisco Moves to Acquire Astrix Security to Tackle Non-Human Identity Risks

    May 4, 2026

    Cybersecurity M&A Roundup: 33 Deals Announced in April 2026

    May 4, 2026

    Over 40,000 Servers Compromised in Ongoing cPanel Exploitation

    May 4, 2026

    US Military Reaches Deals With 7 Tech Companies to Use Their AI on Classified Systems

    May 3, 2026
    Leave A Reply Cancel Reply

    Advertisement
    Top Posts

    The iPad Air brand makes no sense – it needs a rethink

    October 12, 202516 Views

    ChatGPT Group Chats are here … but not for everyone (yet)

    November 14, 20258 Views

    Facebook updates its algorithm to give users more control over which videos they see

    October 8, 20258 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Advertisement
    About Us
    About Us

    SynapseFlow brings you the latest updates in Technology, AI, and Gadgets from innovations and reviews to future trends. Stay smart, stay updated with the tech world every day!

    Our Picks

    Microsoft Warns of Sophisticated Phishing Campaign Targeting US Organizations

    May 5, 2026

    NASA Volunteers Double Known Population of Brown Dwarfs

    May 5, 2026

    A variant of the Xiaomi 18 Ultra may use the Xring O3, Xiaomi’s upcoming in-house chipset

    May 5, 2026
    categories
    • AI News & Updates
    • Cybersecurity
    • Future Tech
    • Reviews
    • Software & Apps
    • Tech Gadgets
    Facebook X (Twitter) Instagram Pinterest YouTube Dribbble
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    © 2026 SynapseFlow All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.