June 8, 2023, 4 p.m. | Microsoft Threat Intelligence

Microsoft Security Blog www.microsoft.com

Microsoft Defender Experts observed a multi-stage adversary-in-the-middle (AiTM) and business email compromise (BEC) attack targeting banking and financial services organizations over two days. This attack originated from a compromised trusted vendor, involved AiTM and BEC attacks across multiple supplier/partner organizations for financial fraud, and did not use a reverse proxy like typical AiTM attacks.


The post Detecting and mitigating a multi-stage AiTM phishing and BEC campaign appeared first on Microsoft Security Blog.

adversary adversary-in-the-middle aitm aitm phishing attack attacks banking bec bec attacks business business email compromise campaign compromise compromised defender email email compromise experts financial financial fraud financial services fraud microsoft microsoft defender organizations partner phishing proxy reverse reverse proxy services stage supplier targeting vendor

More from www.microsoft.com / Microsoft Security Blog

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Premium Hub - CoE: Business Process Senior Consultant, SAP Security Role and Authorisations & GRC

@ SAP | Dublin 24, IE, D24WA02

Product Security Response Engineer

@ Intel | CRI - Belen, Heredia

Application Security Architect

@ Uni Systems | Brussels, Brussels, Belgium

Sr Product Security Engineer

@ ServiceNow | Hyderabad, India

Analyst, Cybersecurity & Technology (Initial Application Deadline May 20th, Final Deadline May 31st)

@ FiscalNote | United Kingdom (UK)