Malicious actors are spicing up their phishing campaigns with bait designed to play off employees’ fears of violating their companies’ codes of conduct, according to the Microsoft Defender Research team. In a May 4 blog post, Microsoft described the ploy as a multi-step “large-scale credential theft campaign” that uses “polished, enterprise-style HTML templates” to deceive users. Over the course of two days in mid-April, 35,000 users from 26 countries were targeted by the phishing campaign, which Microsoft said relies on “concerning accusations and repeated time-bound action prompts” to create a sense of urgency. Nine in 10 (92%) of these users were based in the US, and worked in several industries, including retail, technology, and healthcare. The TL;DR on the campaign. Microsoft said observed emails in the phishing campaign were sent using genuine email delivery services and subject lines like, “Internal case log issued under conduct policy.” If that wasn’t convincing enough, campaign emails also contained: Are there plenty of phish in the sea?—BM |