Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins

Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins

Posted on August 20, 2025August 20, 2025 By CWS

A novel and extremely difficult phishing marketing campaign is actively stealing Microsoft 365 credentials by exploiting Microsoft’s personal Energetic Listing Federation Companies (ADFS) to redirect customers from legit workplace.com hyperlinks to malicious login pages.

The approach, recognized by researchers on the cybersecurity agency Push Safety, marks a major evolution in phishing assaults, successfully bypassing each person vigilance and conventional safety filters.

The assault leverages a mixture of malvertising and a intelligent abuse of Microsoft’s infrastructure. As a substitute of counting on suspicious emails, the attackers place malicious adverts on engines like google.

A person trying to find “Workplace 365” would possibly click on a seemingly legit advert that directs them to a real outlook.workplace.com URL. Nevertheless, this URL is specifically crafted to set off an exploit.

On the coronary heart of the scheme is the abuse of ADFS, a Microsoft characteristic that facilitates single sign-on (SSO) by connecting a company’s native listing with cloud companies.

The menace actors arrange their very own Microsoft tenant and configured its ADFS settings to redirect authentication requests to a phishing area they management.

This manipulation forces Microsoft’s personal servers to ship the unsuspecting sufferer from the trusted workplace.com area to an ideal, pixel-for-pixel duplicate of the Microsoft login web page, Push Safety mentioned.

“That is principally the equal to Outlook.com having an open redirect vulnerability,” famous a researcher from Push of their evaluation.

Phishing Assault Chain

This “ADFSjacking,” because it has been dubbed, is potent as a result of the preliminary redirect originates from a trusted Microsoft supply, making it almost unattainable for URL-based safety instruments and cautious customers to detect the menace.

Request Passing

The investigation revealed a multi-stage redirect chain designed for evasion. After clicking the malicious advert, the person’s browser is invisibly handed via an middleman area, in a single case, a pretend journey weblog, earlier than touchdown on the ultimate phishing website.

This middleman step is designed to idiot automated area categorization instruments, which could classify the hyperlink as innocent, permitting it to go via internet filters.

As soon as on the pretend login web page, which features as an Attacker-in-the-Center (AitM) proxy, any credentials entered are instantly captured. This methodology additionally permits attackers to steal session cookies, enabling them to bypass multi-factor authentication (MFA) protections and acquire full entry to the sufferer’s account.

Malicious Login Web page

This marketing campaign highlights a troubling pattern the place attackers are shifting their supply strategies away from e-mail to channels like malvertising, social media, and prompt messaging, thereby sidestepping sturdy e-mail safety gateways.

To mitigate this menace, safety consultants advocate organizations monitor their community logs for uncommon ADFS redirects, notably these resulting in unfamiliar domains.

Filtering for Google Advert parameters in site visitors directed to workplace.com may assist determine this particular malvertising approach. For end-users, deploying a good advert blocker throughout all internet browsers stays a important protection towards the preliminary lure.

Safely detonate suspicious recordsdata to uncover threats, enrich your investigations, and minimize incident response time. Begin with an ANYRUN sandbox trial → 

Cyber Security News Tags:Active, Directory, Federation, Hackers, Logins, Microsoft, Office.com, Services, Steal, Weaponize

Post navigation

Previous Post: A Free Zero Trust Web Application Firewall for 2026
Next Post: DOM-Based Extension Clickjacking Exposes Popular Password Managers to Credential and Data Theft

Related Posts

Microsoft Confirms Teams Outage for Users, Investigation Underway Microsoft Confirms Teams Outage for Users, Investigation Underway Cyber Security News
Chinese Front Companies Providing Advanced Steganography Solutions for APT Operations Chinese Front Companies Providing Advanced Steganography Solutions for APT Operations Cyber Security News
Security Researchers Expose Lazarus Recruitment Pipeline Live on Camera Through Honeypot Operation Security Researchers Expose Lazarus Recruitment Pipeline Live on Camera Through Honeypot Operation Cyber Security News
Free WormGPT Variant Leveraging DeepSeek, Gemini, and Kimi-K2 AI Models Free WormGPT Variant Leveraging DeepSeek, Gemini, and Kimi-K2 AI Models Cyber Security News
First-Ever Malicious MCP Server Found in the Wild Steals Emails via AI Agents First-Ever Malicious MCP Server Found in the Wild Steals Emails via AI Agents Cyber Security News
Windows Common Log File System 0-Day Vulnerability Actively Exploited in the Wild Windows Common Log File System 0-Day Vulnerability Actively Exploited in the Wild Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News