A person types on a laptop showing a phishing warning, fake login form, and icons for Microsoft apps. An FBI warning badge appears in the corner, highlighting cybersecurity risks.

FBI Warns of Kali365 Attacking Microsoft 365 Users to Steal Logins and Bypass MFA

By Published On: May 22, 2026

FBI Sounds Alarm: Kali365 Unleashes Advanced Phishing on Microsoft 365 Users

The Federal Bureau of Investigation (FBI) has issued a critical cybersecurity warning regarding a sophisticated and rapidly propagating phishing-as-a-service (PhaaS) platform identified as Kali365. This emerging threat specifically targets Microsoft 365 users, aiming to compromise login credentials and, alarmingly, bypass multi-factor authentication (MFA) mechanisms. Understanding Kali365’s operational tactics is paramount for organizations relying on Microsoft 365 for their daily operations.

What is Kali365? Advanced Phishing-as-a-Service Explained

Kali365 represents a dangerous evolution in the PhaaS landscape. It provides threat actors with an accessible and low-barrier entry point into launching highly effective phishing campaigns. The service operates by offering ready-made infrastructure and tools designed to spoof legitimate Microsoft 365 login pages. Threat actors subscribe to Kali365, primarily through clandestine Telegram channels, and then leverage its capabilities to deploy their attacks with minimal technical expertise required. The core objective of Kali365 is to steal access tokens and active session cookies, which subsequently allows attackers to bypass even robust MFA protections.

How Kali365 Bypasses Multi-Factor Authentication (MFA)

The alarming aspect of Kali365 is its demonstrated ability to circumvent MFA. Traditional phishing attacks often fail when users have MFA enabled. However, Kali365 employs advanced techniques, such as real-time phishing (also known as adversary-in-the-middle or AiTM techniques), which can intercept and relay authentication requests, including the MFA challenge. By stealing active session cookies or access tokens post-MFA verification, attackers gain persistent access to a compromised Microsoft 365 account without needing to re-authenticate or re-enter MFA codes.

Distribution and Operational Model

The FBI report highlights that Kali365 is actively distributed and managed through Telegram channels. This choice of distribution vector provides threat actors with a discreet and often encrypted communication platform to share information, updates, and access to the PhaaS platform. This operational model democratizes phishing attacks, making advanced techniques available to a broader range of malicious actors and increasing the overall threat landscape for Microsoft 365 users.

Remediation Actions and Proactive Defense Strategies

Given the severity of the Kali365 threat, organizations must implement robust and proactive defense strategies. A multi-layered approach combining technical controls, user awareness, and incident response planning is essential.

  • Implement Strong Phishing Filters: Ensure email gateways and Microsoft 365’s built-in anti-phishing capabilities are configured for maximum protection. Regularly review and update these configurations.
  • Enhance User Awareness Training: Conduct frequent and engaging training sessions to educate users about phishing tactics, especially those involving fake login pages and social engineering. Emphasize the importance of verifying sender identities and URL authenticity.
  • Conditional Access Policies: Leverage Microsoft 365’s Conditional Access policies to restrict access based on factors like device compliance, location, IP ranges, and application usage. This can help detect and block suspicious access attempts even if credentials are stolen.
  • Monitor Sign-in Logs and Audit Trails: Regularly review Microsoft 365 sign-in logs, audit logs, and unified audit logs for unusual activity, such as logins from unfamiliar locations, impossible travel scenarios, or access to sensitive data immediately after a login.
  • Zero Trust Architecture: Adopt a Zero Trust security model, which assumes no user or device can be inherently trusted, regardless of whether they are inside or outside the network perimeter. Verify every access request.
  • Use Hardware Security Keys for MFA: For critical accounts, consider implementing FIDO2-compliant hardware security keys (e.g., YubiKey) as the primary MFA method. These are highly resistant to phishing and AiTM attacks.
  • Principle of Least Privilege: Ensure users only have access to the resources absolutely necessary for their job functions. This limits the damage in case an account is compromised.

Tools for Detection and Mitigation

Leveraging appropriate tools is vital for detecting and mitigating threats like Kali365 across your Microsoft 365 environment.

Tool Name Purpose Link
Microsoft 365 Defender Comprehensive XDR (Extended Detection and Response) for Microsoft environments, including email, identity, and endpoints. Detects phishing and suspicious login activities. Microsoft 365 Defender
Phishing Training Platforms Simulate phishing campaigns to train users and identify vulnerabilities in employee awareness. Examples include KnowBe4, Proofpoint Security Awareness Training. KnowBe4
Conditional Access Policies (Azure AD) Enforce access policies based on user, device, location, and application. Crucial for detecting anomalous login patterns. Azure AD Conditional Access
Security Information and Event Management (SIEM) Aggregates and analyzes security logs from various sources to detect advanced threats and suspicious behavior. Examples include Splunk, Microsoft Sentinel. Microsoft Sentinel

Key Takeaways for Microsoft 365 Security

The FBI’s warning about Kali365 underscores the persistent and evolving nature of cyber threats. For organizations utilizing Microsoft 365, the key takeaways are clear: phishing remains a primary attack vector, and even MFA is not an impenetrable defense against sophisticated PhaaS platforms employing AiTM techniques. Continuous vigilance, robust technical controls, and comprehensive user education are not just best practices – they are essential lines of defense in safeguarding organizational assets from threats like Kali365.

Share this article

Leave A Comment