Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks

April 4, 2026

[Webinar] Stop Guessing. Learn to Validate Your Defenses Against Real Attacks

April 4, 2026

Claude Extension Flaw Enabled Zero-Click XSS Prompt Injection via Any Website

April 4, 2026
Facebook X (Twitter) Instagram
Saturday, April 4
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»New Phishing Platform Used in Credential Theft Campaigns
News

New Phishing Platform Used in Credential Theft Campaigns

Team-CWDBy Team-CWDApril 3, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A credential theft campaign that targeted C-suite executives and senior personnel at major global organizations from November 2025 to March 2026 has been uncovered by researchers at Abnormal.

 They have detailed a previously undocumented phishing-as-a-service (PhaaS) platform called Venom that served as the campaign’s engine in the infrastructure backend.

Credential Harvesting Attack Explained

The Lures: SharePoint Notifications and QR Code

The campaign involved SharePoint document-sharing notifications sent as lures to a selected list of CEOs, CFOs, chairmen and VP-level executives across over 20 industry verticals.

The lures leveraged financial report themes to encourage targets to scan a QR code embedded directly in the email body.

Additionally, the phishing template employs multiple evasion tactics to bypass detection.

To avoid signature-based scans, each email includes randomized throwaway HTML element altering the structure with every send.

A fabricated five-message email thread tailored to the target is also automatically inserted into the phishing email. The victim’s email prefix is converted into a display name, used in the “From” fields alongside a generated signature with their real details (name, email, company website and a fake phone number).

A second, randomly generated persona acts as the correspondent, while message bodies pull from fixed templates (e.g. meeting requests, financial tables) with multilingual text to mimic legitimate corporate communication.

This combination of noise, personalization, and diversity helps evade spam classifiers.

Filtering Out Non-Human Traffic to Isolate Targets

Once scanned the QR code leads to a landing page acting as a fake verification checkpoint, to determine whether the visitor is a real human target or something else, such as a security scanner, a sandbox or an automated tool.

“Visitors who pass all checks are routed to the credential harvester. Everyone else hits a dead end, with no indication that anything suspicious was encountered,” the Abnormal researchers noted in an April 2 report.

Multifactor Authentication Rendered Ineffective

Victims are then faced with one of two credential-harvesting methods.

In the first, an adversary-in-the-middle (AiTM) setup perfectly mimics the victim’s real login portal, complete with their company branding, pre-filled email and even their organization’s actual identity provider, while silently relaying credentials and multifactor authentication (MFA) codes to Microsoft’s live systems.

The second method avoids login forms entirely, instead tricking the victim into approving a device sign-in through Microsoft’s legitimate device code flow, which then hands over access tokens directly to the attacker.

Once authenticated, the attack ensures persistence without raising suspicion.

In the AiTM mode, the attacker quietly registers a secondary MFA device on the victim’s account, leaving their original authenticator intact and avoiding any visible changes.

In the device code mode, the stolen refresh token remains valid even after password resets, unless an administrator manually revokes all active sessions. This is a step most organizations don’t take by default, the Abnormal researchers noted.

The result is an attack that blends into normal authentication flows, evades detection and maintains access long after the initial compromise.

Venom PhaaS: The Power Engine Behind the Campaign

The Venom PhaaS powering the campaign features a licensing and activation model, structured token storage and a full campaign management interface.

At the time of analysis, Venom had not appeared in any public threat intelligence database and has not been identified in open seller marketplaces or underground forums

According to the researchers, this campaign is “one of the more technically complete phishing operations we’ve documented, [but] less for any single novel technique than for how deliberately each component has been engineered to work together.”

The operator has built an end-to-end pipeline where every stage actively protects the next and a system that renders MFA ineffective.

“The discovery of Venom adds a force multiplier dimension. A closed-access PhaaS platform with licensing, campaign management and structured token storage suggests this capability is not limited to a single operator,” they warned.

“Organizations should assume that the techniques documented here will proliferate and that defensive strategies relying on MFA as a final barrier require immediate reassessment.”

Read now: Global Takedown Neutralizes Tycoon2FA Phishing Service



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleWebRTC Skimmer Bypasses CSP to Steal Payment Data from E-Commerce Sites
Next Article The Cyber Security and Resilience Bill: What You Need to Know Now
Team-CWD
  • Website

Related Posts

News

China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks

April 4, 2026
News

[Webinar] Stop Guessing. Learn to Validate Your Defenses Against Real Attacks

April 4, 2026
News

Claude Extension Flaw Enabled Zero-Click XSS Prompt Injection via Any Website

April 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities

November 27, 20258 Views

Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials

September 5, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Our Picks

Here’s what you should know

February 6, 2026

Watch out for SVG files booby-trapped with malware

September 22, 2025

Find your weak spots before attackers do

November 21, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.