Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft Alerts US Firms to Advanced Phishing Scheme

Microsoft Alerts US Firms to Advanced Phishing Scheme

Posted on May 5, 2026 By CWS

Microsoft has issued a warning to American organizations about a complex phishing scheme that employs a ‘code of conduct review’ angle to trick users into visiting a fraudulent website.

Widespread Targeting of US Organizations

Between April 14 and 16, Microsoft detected more than 35,000 phishing attempts. These malicious emails were aimed at users in approximately 13,000 organizations across 26 countries, with 92% of the targets located in the United States.

The healthcare, life sciences, financial services, professional services, and technology sectors were among the most affected. The phishing emails appeared to be internal communications, employing display names such as ‘Team Conduct Report’ and ‘Workforce Communications’. Subject lines included phrases like ‘Reminder: employer opened a non-compliance case log’.

Technical Breakdown of the Attack

Microsoft’s analysis revealed that the phishing emails were dispatched using a legitimate email delivery service, possibly from a cloud-hosted Windows virtual machine. The emails originated from multiple addresses linked to domains likely controlled by the attackers.

Recipients were instructed to open attachments labeled ‘Awareness Case Log File’ or ‘Disciplinary Action’. These documents contained a link titled ‘Review Case Materials’, which redirected users to a Cloudflare CAPTCHA page to evade automated security analysis.

Phishing Mechanism and Security Implications

After passing the CAPTCHA, victims were directed to a page requesting email address entry, followed by another CAPTCHA challenge. The final stage instructed users to sign into their Microsoft account, where adversary-in-the-middle (AitM) phishing techniques were employed.

This method intercepts authentication tokens in real-time, bypassing even multifactor authentication (MFA) systems that are not resistant to phishing. Microsoft has provided enterprises with mitigation strategies and threat-hunting resources to combat such attacks.

As phishing tactics grow more sophisticated, organizations must remain vigilant and employ robust security measures to protect against these evolving threats.

Security Week News Tags:AI attacks, AiTM, Authentication, CAPTCHA, cloud security, Cybersecurity, email security, Microsoft, Phishing, US organizations

Post navigation

Previous Post: Rising Cyber Threats Target Education Sector Globally
Next Post: Supply Chain Attack Targets DAEMON Tools Software

Related Posts

Siemens, Schneider, and Others Address ICS Vulnerabilities Siemens, Schneider, and Others Address ICS Vulnerabilities Security Week News
Critical Vulnerabilities Patched in Sophos Firewall Critical Vulnerabilities Patched in Sophos Firewall Security Week News
Minnesota Activates National Guard in Response to Cyberattack Minnesota Activates National Guard in Response to Cyberattack Security Week News
Perspective: Why Politics in the Workplace is a Cybersecurity Risk Perspective: Why Politics in the Workplace is a Cybersecurity Risk Security Week News
Linux Kernel Vulnerability Exposes Systems to Attacks Linux Kernel Vulnerability Exposes Systems to Attacks Security Week News
160,000 Impacted by Valsoft Data Breach 160,000 Impacted by Valsoft Data Breach Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • GnuTLS 3.8.13 Update: Key Security Vulnerabilities Fixed
  • Latvian Hacker Jailed for Karakurt Ransomware Crimes
  • China-Linked UAT-8302 Targets Global Governments with APT Malware
  • Supply Chain Attack Targets DAEMON Tools Software
  • Microsoft Alerts US Firms to Advanced Phishing Scheme

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • GnuTLS 3.8.13 Update: Key Security Vulnerabilities Fixed
  • Latvian Hacker Jailed for Karakurt Ransomware Crimes
  • China-Linked UAT-8302 Targets Global Governments with APT Malware
  • Supply Chain Attack Targets DAEMON Tools Software
  • Microsoft Alerts US Firms to Advanced Phishing Scheme

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark