Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Use AI Platforms to Steal Microsoft 365 Credentials in Phishing Campaign

Hackers Use AI Platforms to Steal Microsoft 365 Credentials in Phishing Campaign

Posted on September 5, 2025September 5, 2025 By CWS

Cybercriminals are more and more exploiting the belief organizations place in synthetic intelligence platforms to conduct subtle phishing assaults, based on a brand new report from cybersecurity agency Cato Networks.

The corporate’s Managed Detection and Response (MDR) service just lately uncovered a marketing campaign the place menace actors leveraged Simplified AI, a well-liked advertising and marketing platform, to steal Microsoft 365 credentials from US-based organizations.

The assault, found in July 2025, efficiently compromised a minimum of one US funding agency earlier than being detected and contained.

Whereas the marketing campaign is not lively, safety specialists warn it represents a harmful evolution in cybercrime ways that would have an effect on organizations throughout all industries.

Weaponizing Trusted AI Platforms

“Menace actors are not counting on suspicious servers or low cost lookalike domains,” the Cato Networks report states.

“As a substitute, they abuse the fame and infrastructure of trusted AI platforms that staff already depend on, permitting them to bypass defenses and slip into organizations below the duvet of legitimacy.”

Weaponizing Trusted AI Platforms

The subtle assault started with emails impersonating executives from a worldwide pharmaceutical distributor, full with genuine firm logos and govt names verified by LinkedIn.

The emails contained password-protected PDF attachments designed to evade automated safety scanners that can’t examine encrypted information.

The phishing marketing campaign employed a multi-layered method that exploited each social engineering and technical evasion ways:

Preliminary Contact: Victims acquired emails showing to be from pharmaceutical firm executives, with passwords for connected PDFs conveniently included within the message physique.

PDF Lure: The paperwork displayed professional firm branding and contained hyperlinks directing customers to Simplified AI’s platform at app.simplified.com.

Trusted Redirect: Customers had been taken to what seemed to be a professional Simplified AI web page, displaying the impersonated firm’s identify alongside Microsoft 365 imagery.

Credential Harvest: The ultimate step redirected victims to a convincing pretend Microsoft 365 login portal designed to steal enterprise credentials.

The assault highlights how cybercriminals are adapting to the speedy adoption of AI instruments in company environments.

AI advertising and marketing platforms like Simplified AI have change into commonplace in enterprises, with IT departments routinely whitelisting their domains and permitting worker entry.

pattern malware doc

“For CISOs and IT leaders, approving such providers typically appears simple: permit entry, whitelist the area, and allow the advertising and marketing crew to innovate,” the report notes.

“However what if the exact same platform is leveraged by menace actors to steal from you?”

This incident displays broader issues about “shadow AI” utilization in enterprises, the place staff more and more depend on AI instruments with out correct safety oversight.

The attackers’ use of established platforms makes detection considerably tougher for conventional safety measures.

Mitigations

Safety specialists suggest a number of protecting measures:

Implementing multi-factor authentication on all vital providers

Coaching staff to fastidiously deal with password-protected attachments

Monitoring all AI platform utilization, together with unauthorized purposes

Sustaining steady inspection of AI site visitors relatively than implicitly trusting it

Deploying superior menace detection capabilities that may establish suspicious habits patterns

The assault serves as a wake-up name for organizations to reassess their method to AI platform safety, treating AI site visitors with the identical scrutiny utilized to unknown domains whereas balancing safety wants with enterprise innovation necessities.

Discover this Story Fascinating! Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates.

Cyber Security News Tags:Campaign, Credentials, Hackers, Microsoft, Phishing, Platforms, Steal

Post navigation

Previous Post: More Cybersecurity Firms Hit by Salesforce-Salesloft Drift Breach
Next Post: Hackers Leverages Google Calendar APIs With Serverless MeetC2 Communication Framework

Related Posts

Threat Actors Compromise 270+ Legitimate Websites With Malicious JavaScript Using JSFireTruck Obfuscation Threat Actors Compromise 270+ Legitimate Websites With Malicious JavaScript Using JSFireTruck Obfuscation Cyber Security News
Microsoft Asks IT Admins to Contact for Fix Related to Windows IIS Failure Issues Microsoft Asks IT Admins to Contact for Fix Related to Windows IIS Failure Issues Cyber Security News
Hackers are Leveraging SEO Poisoning to Attack Users Looking for Legitimate Tools Hackers are Leveraging SEO Poisoning to Attack Users Looking for Legitimate Tools Cyber Security News
Beware of the New ‘Executive Award’ Campaign That Uses ClickFix to Deliver Stealerium Malware Beware of the New ‘Executive Award’ Campaign That Uses ClickFix to Deliver Stealerium Malware Cyber Security News
PolarEdge With Custom TLS Server Uses Custom Binary Protocol for C2 Communication PolarEdge With Custom TLS Server Uses Custom Binary Protocol for C2 Communication Cyber Security News
HackerOne Employee Data Breach Exposes Sensitive Information HackerOne Employee Data Breach Exposes Sensitive Information Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark