Attackers have unleashed an EvilProxy phishing campaign to target thousands of Microsoft 365 user accounts worldwide, sending a flood of 120,000 phishing emails to more than 100 organizations across the globe in the three-month period between March and June alone. The goal? To take over C-suite and other executive accounts, in order to mount further attacks deeper within the enterprise.
The ongoing campaign uses a combination of phishing tactics — including brand impersonation, scan blocking, and a multi-step infection chain — to successfully take over cloud accounts of top-level executives, researchers from Proofpoint revealed.
View:
https://direct-link.net/68451/evilproxy-cyberattack-tar
http://bc.vc/ONwNMtL
http://adfoc.us/50323397379175
https://link.usalink.io/EvilProxy-Cyberattack-Tar
https://4cash.me/EvilProxy-Cyberattack-Tar
https://go.youshort.me/EvilProxy-Cyberattack-Tar
https://cuts-url.com/EvilProxy-Cyberattack-Tar