As part of the campaign, the attackers have been using adversary-in-the-middle (AiTM) phishing sites to steal credentials, and have been hijacking sign-in sessions to bypass authentication even with multifactor authentication (MFA) enabled. AiTM is a phishing technique in which the attackers deploy a proxy webserver between the user and the site they are trying to […]
Latest Comments