Threat Actors Leverage File-Sharing Service and Reverse Proxies for Credential Harvesting
Threat Actors Leverage File-Sharing Service and Reverse Proxies for Credential Harvesting
10 November 2023
The use of a reverse proxy in this phishing campaign allows the attackers to bypass multi-factor authentication (MFA) and gain access to victims' Microsoft 365 accounts, leading to further distribution of phishing emails.