
Code of Conduct Phishing Emails Target 35,000 Users in Multi-Stage AiTM Attack
Code of Conduct Phishing Campaign Leverages AiTM to Compromise 35,000 Accounts
A sophisticated phishing operation recently ensnared approximately 35,000 users, leveraging fake “code of conduct” emails to initiate a multi-stage adversary-in-the-middle (AiTM) attack. This campaign bypassed traditional multi-factor authentication (MFA) by hijacking active authentication sessions, representing a significant escalation in phishing tactics.
The Deceptive Lure: Code of Conduct Phishing
The initial vector of this attack was a seemingly innocuous email disguised as an internal communication concerning a “code of conduct” update. Such emails often carry a sense of urgency or importance, compelling recipients to click on embedded links. In this instance, clicking the link led users to a convincing, yet malicious, login page designed to capture their credentials.
Beyond Credential Theft: The AiTM Mechanism
What differentiates this operation from standard phishing is the integration of an AiTM technique. Instead of merely stealing passwords, the attackers employed a proxy server to intercept the entire authentication process. When a user input their credentials and completed their MFA challenge, the AiTM proxy forwarded these details to the legitimate service. Simultaneously, it captured the session cookie. This session cookie, which represents an active authentication token, allowed the attackers to bypass MFA and access the user’s account without needing their password or the second factor again.
Impact on Multi-Factor Authentication (MFA)
Multi-factor authentication is widely regarded as a critical security control, significantly enhancing protection against credential theft. However, AiTM attacks like this one demonstrate that even robust MFA implementations can be circumvented. By hijacking an active session rather than trying to guess or steal credentials directly, the attackers effectively sidestepped the MFA challenge. This incident underscores the evolving landscape of cyber threats and the need for more advanced security measures.
Remediation Actions and Proactive Defenses
- User Education and Awareness: Continuously train employees to recognize phishing attempts, especially those concerning internal policies or urgent requests. Emphasize scrutinizing sender addresses and link destinations before clicking.
- Implement FIDO2/Hardware-Based MFA: Consider transitioning to phishing-resistant MFA methods such as FIDO2 security keys. These methods verify the origin of the login request, making AiTM attacks significantly harder to execute as they cryptographically bind the authentication to the legitimate site.
- Conditional Access Policies: Implement granular conditional access policies that evaluate various factors beyond just credentials, such as IP address, device health, and geographic location, before granting access to sensitive resources.
- Session Monitoring and Anomaly Detection: Deploy security solutions capable of detecting anomalous session behavior, such as logins from unusual locations immediately following a successful authentication, or rapid shifts in user activity.
- Regular Password Rotation (with caution): While not a direct counter to AiTM, encouraging regular password changes for high-risk accounts can reduce the shelf-life of stolen credentials if an AiTM attack is successful.
- Review and Revoke Suspicious Sessions: Regularly audit active user sessions and terminate any that appear suspicious or are not explicitly authorized.
Tools for Detection and Mitigation
| Tool Name | Purpose | Link |
|---|---|---|
| Microsoft Defender for Identity | Detects advanced threats, identity compromise, and malicious insider actions. | Microsoft Defender for Identity |
| Proofpoint Email Protection | Comprehensive email security, including advanced threat protection against phishing. | Proofpoint |
| Cofense PhishMe | Security awareness training and phishing simulation. | Cofense |
| YubiKey | Hardware security keys for FIDO2/phishing-resistant MFA. | Yubico |
Key Takeaways for Enhanced Cybersecurity
This “code of conduct” phishing campaign targeting 35,000 users serves as a stark reminder that cybercriminals are continually innovating. The use of AiTM techniques to bypass MFA highlights the limitations of traditional authentication methods and the critical need for a multi-layered defense strategy. Organizations must prioritize advanced user training, implement phishing-resistant MFA, and deploy robust security monitoring to detect and neutralize such sophisticated attacks before significant damage occurs. Staying informed about emerging threats and adapting security postures accordingly is paramount in protecting digital assets.


