Threat Actors Leverage File-Sharing Service and Reverse Proxies for Credential Harvesting

The use of a reverse proxy in this phishing campaign allows the attackers to bypass multi-factor authentication (MFA) and gain access to victims' Microsoft 365 accounts, leading to further distribution of phishing emails.

>>More