New BEC Campaign Target Executives’ Microsoft 365 Accounts

August 25, 2022

Researchers at Mitiga have uncovered a new Business Email Compromise (BEC) campaign that uses sophisticated spear phishing and Adversary-in-The-Middle (AiTM) tactics to gain access to corporate executives’ Microsoft 365 accounts.

According to researchers, the attackers are able to gain access to high-level accounts to monitor communications and intercept huge financial transactions.

In order to compromise the accounts of executives, the attackers send a phishing email pretending to come from DocuSign. DocuSign is a platform for managing electronic agreements that is commonly used in the business environment.

As soon as executives click on the “Review Document” button in the email, they are directed to a phishing page of a fake domain, where they are asked to log in to the Windows domain.

The attackers use evilginx2 proxy to carry out a so-called Adversary-in-the-Middle (AiTM attack, which allows the attackers to be in the middle between a phishing page and a legitimate login form for a specific company, making it easier for them to spoof login credentials.

The evilginx2 proxy steals the session cookie, which contained the credentials and MFA generated by the Windows domain. Attackers then load the stolen session cookies into their own browser to automatically log into the victim’s account and bypass MFA, as it has been verified by prior login.

The sources for this piece include an article in BleepingComputer.

Top Stories

Related Articles

April 1, 2026 Anthropic has inadvertently exposed the full source code of its Claude Code tool for the second time more...

April 1, 2026 Cisco suffered a cyberattack after attackers used stolen credentials from a compromised developer tool to access its more...

March 30, 2026 Google has expanded its “Results about you” tool, allowing users to remove highly sensitive personal data, including more...

March 27, 2026 Microsoft is updating GitHub Copilot to train on real-world developer interactions, expanding beyond public code datasets to more...

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn