Microsoft 365 credentials stolen via adversary-in-the-middle campaign https://t.co/uMICjcQqKz
How Attackers Use Corrupted Files to Slip Past Security https://t.co/LYcTiKMh6u
.@Trustwave researchers tied the campaign to a phishing-as-a-service platform called Rockstar 2FA — an updated version of the DadSec/Phoenix kit that @Microsoft tracks as Storm-1575. #cybersecurity #infosec #ITsecurity https://t.co/uqWQnufIHW

A new phishing campaign has emerged, utilizing corrupted Microsoft Word documents to compromise user credentials. Researchers from Trustwave have linked this sophisticated attack to a phishing-as-a-service platform named Rockstar 2FA, which is an updated version of the previously known DadSec/Phoenix kit, tracked by Microsoft as Storm-1575. This campaign is characterized by its ability to evade traditional security measures, exploiting vulnerabilities in Word files to facilitate adversary-in-the-middle attacks aimed at stealing Microsoft 365 credentials. The campaign highlights ongoing challenges in cybersecurity, as attackers continue to develop innovative methods to bypass defenses.