Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms

February 7, 2026

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Axios User Agent Helps Automate Phishing on “Unprecedented Scale”
News

Axios User Agent Helps Automate Phishing on “Unprecedented Scale”

Team-CWDBy Team-CWDSeptember 12, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Security experts have warned of a huge uptick in automated phishing activity abusing the Axios user agent and Microsoft’s Direct Send feature.

ReliaQuest claimed in a new report today that it observed a 241% increase in phishing activity using Axios between June and August 2025. Axios accounted for nearly a quarter (24%) of all malicious user-agent activity analyzed in the period, making it 10 times more common than any other agents tracked by ReliaQuest.

The threat intelligence vendor said Axios-powered attacks had a 58% success rate versus just 9% for incidents without the user agent.

What started as a campaign targeting executives and managers in sectors like finance, healthcare and manufacturing has now broadened to regular internet users, it added.

Read more on phishing: Tycoon Phishing Kit Utilizes New Capabilities to Hide Malicious Links

Axios is a lightweight, promise-based HTTP client that enables attackers to scale their phishing campaigns with little effort, the report claimed.

Although a legitimate tool, the agent’s ability to intercept, modify and replay HTTP requests with ease and blend seamlessly into workflows makes it particularly prized.

“Its promise-based API and middleware interceptors let attackers log, tweak, replay, and troubleshoot easily. This makes it easier to bypass multifactor authentication (MFA), hijack session tokens, and tailor attacks to each target,” said ReliaQuest.

“In the Axios activity we saw, QR codes and phishing domains set the trap, then Axios let attackers exploit the data they captured. In the incidents we observed, Axios played a pivotal role in interacting with APIs and bypassing MFA protections.”

Other user agents require threat actors to write complex custom scripts or rely on tools that are more obviously suspicious, whereas Axios combines flexibility and easy automation, and will pass most user-agent analysis and reputation-based filter checks, the report noted.

Direct Send Amplifies Attacks

ReliaQuest noted that attacks that paired Axios with Microsoft’s Direct Send achieved an even higher (70%) success rate in recent campaigns.

That’s because Direct Send is typically trusted by security tools by default.

“Together, Direct Send and Axios form a highly efficient attack pipeline: Direct Send delivers phishing emails that appear legitimate, while Axios automates backend workflows like intercepting MFA tokens and authenticating stolen credentials,” the report explained.

“This seamless system allows attackers to operate at scale with minimal effort, blending into legitimate Axios traffic and evading detection.”

ReliaQuest urged organizations to mitigate the threat of Axios abuse by:

  • Disabling Direct Send if not needed. If it is used, organizations are urged to enforce stricter controls and route internal email activity through an email security gateway for threat inspection, like scanning for malicious QR codes, URLs or PDF attachments
  • Configure anti-spoofing policies on email gateways to block emails pretending to come from trusted sources
  • Train all users, including executives, to recognize phishing emails with subject lines like “MEM0,” “0VERDUE,” and “INV0ICE”
  • Block uncommon top-level domains like .es and .ru unless required for business reasons



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleMalicious npm Packages Exploit Ethereum Smart Contracts to Target Crypto Developers
Next Article CISA Flags TP-Link Router Flaws CVE-2023-50224 and CVE-2025-9377 as Actively Exploited
Team-CWD
  • Website

Related Posts

News

CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms

February 7, 2026
News

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026
News

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Is it time for internet services to adopt identity verification?

January 14, 2026

Why the tech industry needs to stand firm on preserving end-to-end encryption

September 12, 2025

Beware of threats lurking in booby-trapped PDF files

October 7, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.