EvilProxy Campaign Fires Out 120,000 Phishing Emails

by CybrGPT
0 comment

Researchers have warned of a new multi-factor authentication (MFA) phishing campaign targeting thousands of users, including a large share of C-suite executives.

The group behind it sent at least 120,000 phishing emails to hundreds of organizations across the globe between March and June this year, according to Proofpoint.

These emails typically impersonate legitimate trusted services and apps such as DocuSign and Adobe and utilize scan blocking to stay hidden from many security tools. Attackers also use a multi-step infection chain to avoid detection – redirecting users who click through via via open legitimate redirectors such as YouTube, malicious cookies and 404 redirects.

The campaign uses EvilProxy, a well-known phishing tool based on a reverse proxy architecture which is designed to harvest MFA-protected credentials and session cookies. It does this by intercepting the MFA request to a fake domain and grabbing the valid session cookie, which it uses to authenticate in the real domain, said Proofpoint.

Read more on EvilProxy: MFA Bypass Kits Account For One Million Monthly Messages

Although the threat group cast its net far and wide with this campaign, its main target appears to have been senior executives.

“These titleholders are especially valued by threat actors due to their potential access to sensitive data and financial assets. Once a targeted user has provided their credentials, attackers were able to log into their Microsoft 365 account within seconds, indicating a streamlined and automated process,” Proofpoint explained.

“Amongst the hundreds of compromised users, approximately 39% were C-level executives of which 17% were chief financial officers, and 9% were presidents and CEOs. Attackers have also shown interest in lower-level management, focusing their efforts on personnel with access to financial assets or sensitive information.”

Proofpoint claimed to have recorded a 100% increase in “cloud account takeover incidents” impacting high-level executives at leading companies over the past six months.

Once they gain access to executives’ Microsoft 365 accounts, the threat actors will look to establish persistence, then move laterally, potentially deploying additional malware.

“In order to monetize their access, attackers were seen executing financial fraud, performing data exfiltration or partaking in hacking-as-a-service (HaaS) transactions, and selling access to compromised user accounts,” Proofpoint concluded.

Source link

You may also like

Leave a Comment

Stay informed with the latest in cybersecurity news. Explore updates on malware, ransomware, data breaches, and online threats. Your trusted source for digital safety and cyber defense insights.

BuyBitcoinFiveMinute

Subscribe my Newsletter for new blog posts, tips & new photos. Let’s stay updated!

© 2025 cybrgpt.com – All rights reserved.