The AiTM Campaign That Made Your Policies Work Against You

email identity AiTM https://www.pexels.com/photo/icons-on-cellphone-screen-8829445/

A recent large-scale credential theft campaign discovered by Microsoft Defender Research serves as a prime demonstration of how institutional culture can become the attack surface for increasingly sophisticated phishing attacks. The design of the lure in this campaign exploited regulatory anxiety, leveraging display names mimicking HR and compliance functions. The email subject lines were engineered with phrases like “non-compliance case log,” acting as a psychological trigger for urgency and authority. Heavily regulated industries such as healthcare and financial services were disproportionately targeted in this campaign.

Inside the Kill Chain

The attack chain in this campaign was able to progress from the target’s inbox to the attackers obtaining session tokens in three stages, using a multi-stage redirect architecture that obscured the malicious destination from email security filters. The success of the initial phishing messages relied upon advanced social engineering methods leveraging user trust and urgency, followed by multiple CAPTCHA and intermediate stages to simultaneously increase perceived legitimacy and filter out automated defenses.

The attackers leveraged adversary-in-the-middle (AitM) proxy mechanics using real-time authentication session interception, as opposed to traditional credential harvesting. The terminal objective of the attack was to capture tokens in order to obtain persistent account access without the need for stored passwords. “The true danger of many phishing schemes lies in their ability to grant attackers access to credentials, enabling them to masquerade as trusted insiders,” says Rex Booth, Chief Information Security Officer at SailPoint, an Austin, Texas-based enterprise identity security provider.

Why Conventional Controls Failed at Scale

AitM attacks are able to proxy authentication traffic and intercept tokens to gain immediate access to target accounts. This technique bypasses traditional security measures that are widely relied upon, such as multi-factor authentication (MFA) that uses push-notifications and time-based one-time passwords (TOTPs). With 35,000 users targeted by this campaign in the course of 72 hours, the attack volume signals the adversary’s confidence in the reliability of their MFA bypass abilities.

Legacy MFA measures are designed to augment the security of traditional password-based authentication by providing an additional, independent source of verification, such as TOTPs, push notifications, or codes sent to a user’s phone number. These methods do add a layer of security, but they still rely on seeds, tokens, and other shared secrets that attackers can manipulate or intercept. Phishing-resistant MFA like FIDO2 passkeys, in contrast, rely on cryptographic authentication where credentials are device-bound and asymmetrically encrypted.

Scope and Sector Exposure: Reading the Target Map

This campaign’s distribution is heavily skewed, with 92% of targeted users located in the United States, indicating a significant geographical focus. The full reach of the campaign reached across 26 countries, demonstrating a balancing act between opportunistic scale and surgical targeting. The victimization of over 13,000 organizations highlights the downstream supply chain and third-party risk surface presented by the scale and scope of the campaign.

Rather than concentrating on just one vertical, the victims of the campaign were cross-sector, with a particular focus on healthcare (19%), financial services (18%), professional services (11%), and technology and software (11%) organizations. The targeting of certain industries compounded the risk in these attacks, as areas like healthcare and financial services tend toward a high compliance culture and offer high-value account access.

The Identity Perimeter is the New Front Line

This massive campaign signals a number of important factors for organizational and individual defenses in the modern threat landscape. Token-based post-authentication attacks are the defining threat pattern, displacing credential phishing as bad actors continue to evolve their tactics to circumvent advancing security measures.

Many organizations still have significant gaps in detection—behavioral signals and anomalous session activity serve as the last reliable indicator of malicious presence. Organizations looking to defend against sophisticated attacks now and moving forward must reckon with the need to adopt phishing-resistant MFA, harden conditional access, and accept the limits of user training against social engineering that exploits institutional design.

Author
  • Contributing Writer, Security Buzz
    PJ Bradley is a writer from southeast Michigan with a Bachelor's degree in history from Oakland University. She has a background in school-age care and experience tutoring college history students.