Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Use AI Platforms to Steal Microsoft 365 Credentials in Phishing Campaign

Hackers Use AI Platforms to Steal Microsoft 365 Credentials in Phishing Campaign

Posted on September 5, 2025September 5, 2025 By CWS

Cybercriminals are more and more exploiting the belief organizations place in synthetic intelligence platforms to conduct subtle phishing assaults, based on a brand new report from cybersecurity agency Cato Networks.

The corporate’s Managed Detection and Response (MDR) service just lately uncovered a marketing campaign the place menace actors leveraged Simplified AI, a well-liked advertising and marketing platform, to steal Microsoft 365 credentials from US-based organizations.

The assault, found in July 2025, efficiently compromised a minimum of one US funding agency earlier than being detected and contained.

Whereas the marketing campaign is not lively, safety specialists warn it represents a harmful evolution in cybercrime ways that would have an effect on organizations throughout all industries.

Weaponizing Trusted AI Platforms

“Menace actors are not counting on suspicious servers or low cost lookalike domains,” the Cato Networks report states.

“As a substitute, they abuse the fame and infrastructure of trusted AI platforms that staff already depend on, permitting them to bypass defenses and slip into organizations below the duvet of legitimacy.”

Weaponizing Trusted AI Platforms

The subtle assault started with emails impersonating executives from a worldwide pharmaceutical distributor, full with genuine firm logos and govt names verified by LinkedIn.

The emails contained password-protected PDF attachments designed to evade automated safety scanners that can’t examine encrypted information.

The phishing marketing campaign employed a multi-layered method that exploited each social engineering and technical evasion ways:

Preliminary Contact: Victims acquired emails showing to be from pharmaceutical firm executives, with passwords for connected PDFs conveniently included within the message physique.

PDF Lure: The paperwork displayed professional firm branding and contained hyperlinks directing customers to Simplified AI’s platform at app.simplified.com.

Trusted Redirect: Customers had been taken to what seemed to be a professional Simplified AI web page, displaying the impersonated firm’s identify alongside Microsoft 365 imagery.

Credential Harvest: The ultimate step redirected victims to a convincing pretend Microsoft 365 login portal designed to steal enterprise credentials.

The assault highlights how cybercriminals are adapting to the speedy adoption of AI instruments in company environments.

AI advertising and marketing platforms like Simplified AI have change into commonplace in enterprises, with IT departments routinely whitelisting their domains and permitting worker entry.

pattern malware doc

“For CISOs and IT leaders, approving such providers typically appears simple: permit entry, whitelist the area, and allow the advertising and marketing crew to innovate,” the report notes.

“However what if the exact same platform is leveraged by menace actors to steal from you?”

This incident displays broader issues about “shadow AI” utilization in enterprises, the place staff more and more depend on AI instruments with out correct safety oversight.

The attackers’ use of established platforms makes detection considerably tougher for conventional safety measures.

Mitigations

Safety specialists suggest a number of protecting measures:

Implementing multi-factor authentication on all vital providers

Coaching staff to fastidiously deal with password-protected attachments

Monitoring all AI platform utilization, together with unauthorized purposes

Sustaining steady inspection of AI site visitors relatively than implicitly trusting it

Deploying superior menace detection capabilities that may establish suspicious habits patterns

The assault serves as a wake-up name for organizations to reassess their method to AI platform safety, treating AI site visitors with the identical scrutiny utilized to unknown domains whereas balancing safety wants with enterprise innovation necessities.

Discover this Story Fascinating! Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates.

Cyber Security News Tags:Campaign, Credentials, Hackers, Microsoft, Phishing, Platforms, Steal

Post navigation

Previous Post: More Cybersecurity Firms Hit by Salesforce-Salesloft Drift Breach
Next Post: Hackers Leverages Google Calendar APIs With Serverless MeetC2 Communication Framework

Related Posts

Threat Actors Weaponizing YouTube Video Download Site to Download Proxyware Malware Threat Actors Weaponizing YouTube Video Download Site to Download Proxyware Malware Cyber Security News
Cerberus Stalkerware Exploits Google Play with Firebase Cerberus Stalkerware Exploits Google Play with Firebase Cyber Security News
ASUS Armoury Crate Vulnerability Let Attackers Escalate to System User on Windows Machine ASUS Armoury Crate Vulnerability Let Attackers Escalate to System User on Windows Machine Cyber Security News
FBI and Indonesian Police Dismantle Global Phishing Network FBI and Indonesian Police Dismantle Global Phishing Network Cyber Security News
10 Best Security Service Edge (SSE) Solutions 10 Best Security Service Edge (SSE) Solutions Cyber Security News
Top Fraud Detection Tools for 2026 Top Fraud Detection Tools for 2026 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark