all InfoSec news
Detecting and mitigating a multi-stage AiTM phishing and BEC campaign
Microsoft Security Blog www.microsoft.com
Microsoft Defender Experts observed a multi-stage adversary-in-the-middle (AiTM) and business email compromise (BEC) attack targeting banking and financial services organizations over two days. This attack originated from a compromised trusted vendor, involved AiTM and BEC attacks across multiple supplier/partner organizations for financial fraud, and did not use a reverse proxy like typical AiTM attacks.
The post Detecting and mitigating a multi-stage AiTM phishing and BEC campaign appeared first on Microsoft Security Blog.
adversary adversary-in-the-middle aitm aitm phishing attack attacks banking bec bec attacks business business email compromise campaign compromise compromised defender email email compromise experts financial financial fraud financial services fraud microsoft microsoft defender organizations partner phishing proxy reverse reverse proxy services stage supplier targeting vendor