• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

“Greatness” Phishing Tool Exploits Microsoft 365 Credentials

You are here: Home / Cyber Security News / “Greatness” Phishing Tool Exploits Microsoft 365 Credentials

A new phishing-as-a-company (PaaS) resource called “Greatness” has been deployed as element of many phishing strategies considering the fact that at minimum mid-2022.

The findings occur from security scientists at Cisco Talos, who described them in an advisory revealed on Wednesday.

“Greatness incorporates attributes viewed in some of the most advanced PaaS offerings, this kind of as multi-variable authentication (MFA) bypass, IP filtering and integration with Telegram bots,” wrote researcher Tiago Pereira.

Dependent on the company’s investigation, Greatness is solely targeting victims via Microsoft 365 phishing internet pages. The firm offers its affiliates an attachment and url builder to produce reliable-wanting decoy and login pages.

Browse extra on very similar attacks: Microsoft 365 Apps Continue to be the Most Exploited Cloud Expert services

“It includes features this kind of as getting the victim’s email handle pre-filled and displaying their suitable company symbol and background graphic, extracted from the focus on organization’s true Microsoft 365 login web page,” Pereira defined.

“This tends to make Greatness particularly well-suited for phishing organization buyers.”

After examining the domains focused in different campaigns, Cisco Talos found that the victims had been primarily firms positioned in the US, British isles, Australia, South Africa and Canada. 

Manufacturing, wellness care and technology have been the sectors most commonly qualified. On the other hand, Pereira clarified the distribution of victims assorted a little involving strategies in conditions of place and sector.

“To use Greatness, affiliate marketers have to deploy and configure a presented phishing package with an API essential that enables even unskilled menace actors to easily just take advantage of the service’s a lot more sophisticated options,” reads the advisory.

“The phishing kit and API perform as a proxy to the Microsoft 365 authentication technique, executing a ‘man-in-the-middle’ attack and stealing the victim’s authentication qualifications or cookies.”

The Indicators of Compromise (IOC) for the analysis executed by Cisco Talos are offered on their GitHub repository.

The results appear a pair of months soon after Kaspersky security scientists uncovered a new form of phishing attack that used authentic servers from Microsoft’s collaboration platform, SharePoint.

Some parts of this article are sourced from:
www.infosecurity-magazine.com

Previous Post: « New APT Group Red Stinger Targets Military and Critical Infrastructure in Eastern Europe
Next Post: Threat Actors Use Babuk Code to Build Hypervisor Ransomware »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Hackers Use Leaked Shellter Tool License to Spread Lumma Stealer and SectopRAT Malware
  • Anatsa Android Banking Trojan Hits 90,000 Users with Fake PDF App on Google Play
  • Malicious Pull Request Infects 6,000+ Developers via Vulnerable Ethcode VS Code Extension
  • 5 Ways Identity-based Attacks Are Breaching Retail
  • RondoDox Botnet Exploits Flaws in TBK DVRs and Four-Faith Routers to Launch DDoS Attacks

Copyright © 2025 · AllTech.News, All Rights Reserved.