“microsoft warns of sophisticated phishing campaign targeting us organizations microsoft has warned organizations in the united states about a sophisticated phishing campaign that uses a “ code of conduct review ” theme to lure victims to a malicious website. the tech giant observ…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1566.002Spearphishing Link
88%
“that are likely attacker - controlled, ” microsoft explained. the recipient is instructed to open a personalized attachment to review case materials. the attachments are pdf documents titled ‘ awareness case log file ’ or ‘ disciplinary action ’ that direct the user to click the …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1556.006Multi-Factor Authentication
76%
“, bypassing non - phishing - resistant multifactor authentication ( mfa ), ” microsoft noted. enterprises at risk of being targeted in this and similar phishing campaigns have been provided with recommendations for mitigating attacks, as well as threat - hunting queries and indic…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
“, bypassing non - phishing - resistant multifactor authentication ( mfa ), ” microsoft noted. enterprises at risk of being targeted in this and similar phishing campaigns have been provided with recommendations for mitigating attacks, as well as threat - hunting queries and indic…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1566.001Spearphishing Attachment
53%
“microsoft warns of sophisticated phishing campaign targeting us organizations microsoft has warned organizations in the united states about a sophisticated phishing campaign that uses a “ code of conduct review ” theme to lure victims to a malicious website. the tech giant observ…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1598.002Spearphishing Attachment
45%
“microsoft warns of sophisticated phishing campaign targeting us organizations microsoft has warned organizations in the united states about a sophisticated phishing campaign that uses a “ code of conduct review ” theme to lure victims to a malicious website. the tech giant observ…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1111Multi-Factor Authentication Interception
40%
“that are likely attacker - controlled, ” microsoft explained. the recipient is instructed to open a personalized attachment to review case materials. the attachments are pdf documents titled ‘ awareness case log file ’ or ‘ disciplinary action ’ that direct the user to click the …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1566.002Spearphishing Link
34%
“, bypassing non - phishing - resistant multifactor authentication ( mfa ), ” microsoft noted. enterprises at risk of being targeted in this and similar phishing campaigns have been provided with recommendations for mitigating attacks, as well as threat - hunting queries and indic…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
The malicious emails claim to contain a conduct report and lure victims to a Microsoft phishing website that leverages AitM.