The campaign follows a multi-stage execution flow designed to evade traditional email security filters and maintain stealth.
Initial Vector
Phishing emails are dispatched from compromised accounts of trusted vendors. These emails contain SharePoint URLs that require authentication, mimicking standard corporate document-sharing workflows to lower victim suspicion.
Adversary-in-the-Middle (AiTM) Proxying
Victims are directed to a proxy server that mirrors a legitimate Microsoft 365 login page. When credentials and MFA codes are entered, the attacker intercepts the
session cookie in real-time.
Stealth & Persistence
Upon successful session takeover, threat actors immediately implement automated inbox rules to delete incoming security alerts and mark messages as "read". They actively monitor mailboxes to delete "Out of Office" notifications and undelivered reports to prevent detection.
Expansion
Using the compromised account, attackers launch secondary phishing campaigns—sometimes exceeding 600 emails—to internal and external contacts found in the victim's inbox history.
Infrastructure Indicators
178.130.46[.]8
(Attacker infrastructure)
193.36.221[.]10
(Attacker infrastructure)
Recommendation / Remediation
Standard password resets are
insufficient for AiTM attacks as the stolen session cookie remains valid. Follow this prioritized pl
Session Invalidation
Revoke all active session tokens for compromised users via the Microsoft 365 Admin Center to terminate the attacker's current access.
MFA Audit
Inspect and reset MFA settings. Attackers often register their own phone numbers or devices as backup MFA methods to maintain long-term access.
Inbox Rule Scrubbing
Manually review and delete all "delete" or "move to folder" rules created after the initial compromise timestamp.
Phishing-Resistant MFA
Shift to FIDO2-based hardware keys or certificate-based authentication (NIST SP 800-63B). Traditional SMS or app-based OTPs are vulnerable to the proxying techniques used in this campaign.
Conditional Access (CA)
Implement CA policies that evaluate device compliance, IP reputation, and geographic location to block sign-ins from known malicious infrastructure like the IPs listed above.
References
Cybersecurity News
(Jan 2026)
NIST SP 800-63B
(Digital Identity Guidelines).
SANS Institute
"Defending Against Adversary-in-the-Middle (AiTM) Phishing."