Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

One in Eight Workers Has Sold Their Corporate Logins

May 6, 2026

Microsoft Confirms Active Exploitation of Windows Shell CVE-2026-32202

May 6, 2026

AI Adoption Outpaces Safety Policies, Leaving Organizations Exposed

May 6, 2026
Facebook X (Twitter) Instagram
Wednesday, May 6
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Microsoft Flags Mass Phishing Campaign Using Fake Compliance Emails
News

Microsoft Flags Mass Phishing Campaign Using Fake Compliance Emails

Team-CWDBy Team-CWDMay 5, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A phishing campaign targeting more than 35,000 users across 13,000 organizations has been identified by the Microsoft Defender Research team.

The large-scale credential theft campaign used fake internal compliance or regulatory communications as lures for the campaign.

The lures in this campaign used polished, enterprise-style HTML templates with structured layouts and preemptive authenticity statements, making them appear more credible than typical phishing emails and increasing their plausibility as legitimate internal communications. 

The campaign ran between April 15 and 16, 2026, and primarily targeted US firms, but was identified in organizations across 26 countries total.

Urgent Compliance Phishing Lure

According to Microsoft’s findings, the messages contained concerning accusations and repeated time-bound action prompts. This gave the campaign a sense of urgency and pressure for victims to act.

For example, subject lines included “Internal case log issued under conduct policy” and the messages claimed that a “code of conduct review” had been initiated, and referenced organization-specific names embedded within the text.

The emails instructed recipients to “open the personalized attachment” to review case materials.

The attached PDF encouraged recipients to click the “Review Case Materials” link, this is what initiated the credential harvesting flow.

The attackers designed the message to appear legitimate by claiming it came from an authorized internal channel and that all links and attachments had been securely reviewed.

A green banner claiming the message had been encrypted using Paubox, a legitimate service associated with HIPAA-compliant communications, further reinforced credibility.

When the recipient clicked on the link within the PDF they were redirected to a landing page which displayed a Cloudflare CAPTCHA, presented as a mechanism to validate that the user was coming “from a valid session”. This was likely to deter automated analysis and sandboxes, according to Microsoft.

After passing the CAPTCHA, victims were redirected to another site claiming the documents were encrypted and required account authentication to proceed.

Microsoft observed an attack chain resembling device code phishing but confirmed only the adversary-in-the-middle (AiTM) component.

Victims were led through multiple staged pages with email entries, CAPTCHAs and reassuring status messages before being redirected, based on device type, to a final phishing site.

There, users were prompted to sign in with Microsoft under the guise of a compliance review, triggering an AiTM session hijack to steal authentication tokens and compromise accounts.

Protection Guidance From Microsoft

Microsoft recommended serval mitigations to reduce the impact of this threat, including, but not limited to:

  • Review the recommended settings for Exchange Online Protection and Microsoft Defender for Office 365 to ensure your organization has established essential defenses and knows how to monitor and respond to threat activity
  • Run realistic attack scenarios during awareness training so employees are prepared to spot such phishing attempts
  • Enable password-less authentication methods for accounts that support password-less. For accounts that still require passwords, use authenticator apps like Microsoft Authenticator for multifactor authentication (MFA)
  • Turn on Safe Links and Sade Attachments in Microsoft Defender for Office 365
  • Configure automatic attack disruption in Microsoft Defender XDR



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleMythos Changed the Math on Vulnerability Discovery. Most Teams Aren’t Ready for the Remediation Side
Next Article Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & More
Team-CWD
  • Website

Related Posts

News

One in Eight Workers Has Sold Their Corporate Logins

May 6, 2026
News

Microsoft Confirms Active Exploitation of Windows Shell CVE-2026-32202

May 6, 2026
News

AI Adoption Outpaces Safety Policies, Leaving Organizations Exposed

May 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views
Our Picks

The hidden risks of browser extensions – and how to avoid them

September 13, 2025

Is Poshmark safe? How to buy and sell without getting scammed

February 19, 2026

A quick guide to recovering a hacked account

March 21, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.