{"id":45291,"date":"2026-04-10T04:34:08","date_gmt":"2026-04-09T20:34:08","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/10\/new-venom-phishing-attacks-steal-senior-executives-microsoft-logins\/"},"modified":"2026-04-10T04:34:08","modified_gmt":"2026-04-09T20:34:08","slug":"new-venom-phishing-attacks-steal-senior-executives-microsoft-logins","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/10\/new-venom-phishing-attacks-steal-senior-executives-microsoft-logins\/","title":{"rendered":"New VENOM phishing attacks steal senior executives&#8217; Microsoft logins"},"content":{"rendered":"\n<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" height=\"900\" src=\"https:\/\/www.bleepstatic.com\/content\/hl-images\/2025\/09\/03\/AI-Hacker.jpg\" width=\"1600\" alt=\"New VENOM phishing attacks steal senior executives' Microsoft logins\"><\/p>\n<p>Threat actors using a previously undocumented phishing-as-a-service (PhaaS) platform called &ldquo;VENOM&rdquo; are targeting credentials of C-suite executives across multiple industries.<\/p>\n<p>The operation has been active since at least last November and appears to target specific individuals who serve as CEOs, CFOs, or VPs at their companies.<\/p>\n<p>VENOM also seems to be closed access, as it has not been promoted on public channels and underground forums, thus reducing its exposure to researchers.<\/p>\n<div align=\"center\" style=\"width:98%; margin:0 auto; text-align:center; padding:4px; background:#f0f0f0; border:1px solid #ccc; border-radius:6px;\">  <a href=\"https:\/\/www.adaptivesecurity.com\/demo\/security-awareness-training?utm_source=display_network&amp;utm_medium=paid_display&amp;utm_campaign=2026_04_display_bleepingcomputer&amp;utm_id=701Rd00000fE8REIA0&amp;utm_content=970x250\" rel=\"nofollow noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/a\/as-tour-the-platform-970-x250.jpg\" style=\"margin-top: 0px;\" alt=\"New VENOM phishing attacks steal senior executives' Microsoft logins\"><\/a> <\/div>\n<h3>The VENOM attack chain<\/h3>\n<p>The phishing emails, observed by researchers at cybersecurity company Abnormal, impersonated Microsoft SharePoint document-sharing notifications as part of internal communication.<\/p>\n<p>The messages are highly personalized and include random HTML noise such as fake CSS classes and comments. The attacker also injects fake email threads tailored to the target, increasing credibility.<\/p>\n<p>A QR code rendered in Unicode is provided for the victim to scan for access. The trick is designed to bypass scanning tools and shift the attack to mobile devices.<\/p>\n<p>&nbsp;<\/p>\n<div style=\"text-align:center\">\n<figure style=\"display:inline-block\"><img loading=\"lazy\" decoding=\"async\" height=\"400\" src=\"https:\/\/www.bleepstatic.com\/images\/news\/u\/1220909\/2026\/April\/VENOM-PhaaS-Malicious-Email.jpg\" width=\"396\" alt=\"New VENOM phishing attacks steal senior executives' Microsoft logins\"><figcaption><strong>Sample of a phishing email<\/strong><br \/><em>Source: Abnormal<\/em><\/figcaption><\/figure>\n<\/div>\n<p>&ldquo;The target&#8217;s email address is double Base64-encoded in the URL fragment&mdash;the portion after the # character,&rdquo; <a href=\"https:\/\/abnormal.ai\/blog\/venom-phishing-campaign-mfa-credential-theft\" target=\"_blank\" rel=\"nofollow noopener\">Abnormal researchers explain<\/a>.<\/p>\n<p>&ldquo;Fragments are never transmitted in HTTP requests, making the target&#8217;s email invisible to server-side logs and URL reputation feeds.&rdquo;<\/p>\n<p>When the victim scans the QR code, they are taken to a landing page that serves as a filter for security researchers and sandboxed environments, ensuring that only real targets are redirected to the phishing platform. Users outside the threat actor&#8217;s interest&nbsp;are redirected to legitimate websites to reduce suspicion.<\/p>\n<p>Those who pass the tests are taken to a credential-harvesting page that proxies a Microsoft login flow in real time, relaying credentials and multi-factor authentication (MFA) codes to Microsoft APIs and capturing the session token.<\/p>\n<div style=\"text-align:center\">\n<figure style=\"display:inline-block\"><img loading=\"lazy\" decoding=\"async\" height=\"481\" src=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-venom-phishing-attacks-steal-senior-executives-microsoft-logins\/data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" width=\"752\" data-src=\"https:\/\/www.bleepstatic.com\/images\/news\/u\/1220909\/2026\/April\/VENOM-PhaaS-AiTM-Mode.jpg\" alt=\"New VENOM phishing attacks steal senior executives' Microsoft logins\"><figcaption><strong>VENOM&#8217;s AiTM method<\/strong><br \/><em>Source: Abnormal<\/em><\/figcaption><\/figure>\n<\/div>\n<p>Apart from the adversary-in-the-middle (AiTM) method, Abnormal has also observed a device-code phishing tactic in which the victim is tricked into approving access&nbsp; to their Microsoft account for a rogue device.<\/p>\n<div style=\"text-align:center\">\n<figure style=\"display:inline-block\"><img loading=\"lazy\" decoding=\"async\" height=\"481\" src=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-venom-phishing-attacks-steal-senior-executives-microsoft-logins\/data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" width=\"752\" data-src=\"https:\/\/www.bleepstatic.com\/images\/news\/u\/1220909\/2026\/April\/VENOM-PhaaS-Device-Code-Mode.jpg\" alt=\"New VENOM phishing attacks steal senior executives' Microsoft logins\"><figcaption><strong>The device code attack method<\/strong><br \/><em>Source: Abnormal<\/em><\/figcaption><\/figure>\n<\/div>\n<p>This method has <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-eviltokens-service-fuels-microsoft-device-code-phishing-attacks\/\" target=\"_blank\" rel=\"nofollow noopener\">become very popular<\/a>&nbsp;over the past year due to its effectiveness and resistance to password resets, with at least <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/device-code-phishing-attacks-surge-37x-as-new-kits-spread-online\/\" target=\"_blank\" rel=\"nofollow noopener\">11 phishing kits<\/a> currently offering it as an option.<\/p>\n<p>In both methods, VENOM quickly establishes persistent access during the authentication process. In the AiTM flow, it registers a new device on the victim&rsquo;s account. In the device code flow, it obtains a token that also provides access to the account.<\/p>\n<p>The researchers note that MFA is no longer sufficient as a defense. C-suite executives should use FIDO2 authentication, disable the device code flow when not needed, and block token abuse by implementing stricter conditional access policies.<\/p>\n<style> .ia_ad {     background-color: #f0f6ff;     width: 95%;     max-width: 800px;     margin: 15px auto;     border-radius: 8px;     border: 1px solid #d6ddee;     display: flex;     align-items: stretch;     padding: 0;     overflow: hidden; }  .ia_lef {     flex: 1;     max-width: 200px;     height: auto;     display: flex;     align-items: stretch; }  .ia_lef a {     display: flex;     width: 100%;     height: 100%; }   .ia_lef a img {     width: 100%;     height: 100%;          border-radius: 8px 0 0 8px;     margin: 0;     display: block; }  .ia_rig {     flex: 2;     padding: 10px;     display: flex;     flex-direction: column;     justify-content: center; }  .ia_rig h2 {     font-size: 17px !important;     font-weight: 700;     color: #333;     line-height: 1.4;     font-family: Georgia, \"Times New Roman\", Times, serif;     margin: 0 0 14px 0; }  .ia_rig p {     font-weight: bold;     font-size: 14px;     margin: 0 0 clamp(6px, 2vw, 14px) 0; }  .ia_button {     background-color: #FFF;     border: 1px solid #3b59aa;     color: black;     text-align: center;     text-decoration: none;     border-radius: 8px;     display: inline-block;     font-size: 16px;     font-weight: bold;     cursor: pointer;     padding: 10px 20px;     width: fit-content; }  .ia_button a {     text-decoration: none;     color: inherit;     display: block; }  @media (max-width: 600px) {     .ia_ad {         flex-direction: column;         align-items: center;     }      .ia_lef {         max-width: 100%;     }      .ia_lef a img {         border-radius: 8px 8px 0 0;     }       .ia_rig {         padding: 15px;         width: 100%;     }      .ia_button {         width: 100%; \tmargin: 0px auto;     } } <\/style>\n<div>\n<div>         <a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">             <img decoding=\"async\" src=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-venom-phishing-attacks-steal-senior-executives-microsoft-logins\/data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-src=\"https:\/\/www.bleepstatic.com\/c\/p\/picus-whitepaper.jpg\" alt=\"New VENOM phishing attacks steal senior executives' Microsoft logins\"><\/a>     <\/div>\n<div>\n<h2><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Automated Pentesting Covers Only 1 of 6 Surfaces.<\/a><\/h2>\n<p>Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.<\/p>\n<p>This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.<\/p>\n<p>           <button><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Get Your Copy Now<\/a><\/button>     <\/div>\n<\/p><\/div>\n<div>\n<h3>Related Articles:<\/h3>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/device-code-phishing-attacks-surge-37x-as-new-kits-spread-online\/\">Device code phishing attacks surge 37x as new kits spread online<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-eviltokens-service-fuels-microsoft-device-code-phishing-attacks\/\">New EvilTokens service fuels Microsoft device code phishing attacks<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/tycoon2fa-phishing-platform-returns-after-recent-police-disruption\/\">Tycoon2FA phishing platform returns after recent police disruption<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/europol-coordinated-action-disrupts-tycoon2fa-phishing-platform\/\">Europol-coordinated action disrupts Tycoon2FA phishing platform<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/phishing-campaign-targets-freight-and-logistics-orgs-in-the-us-europe\/\">Phishing campaign targets freight and logistics orgs in the US, Europe<\/a><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Threat actors using a previously undocumented phishing- [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-45291","post","type-post","status-publish","format-standard","hentry","category--bleepingcomputer"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45291","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45291"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45291\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45291"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45291"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}