TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

GBHackers

Code of Conduct Phish Hits 35,000 Users in Multi-Stage AiTM Attack

Mayura Kathir · 1 day ago · Read original ↗

ATT&CK techniques detected

6 predictions
T1566.002Spearphishing Link
98%
"through an authorized internal channel. ” a large - scale credential theft campaign observed by microsoft defender research exemplifies this trend, using code of conduct - themed lures. a green banner referencing paubox encryption further reinforced legitimacy, especially for org…"
T1566.002Spearphishing Link
90%
"code of conduct phish hits 35, 000 users in multi - stage aitm attack a highly sophisticated phishing campaign leveraging code - of - conduct - themed lures has targeted more than 35, 000 users across 13, 000 organizations. the multi - stage attack, observed between april 14 and …"
T1111Multi-Factor Authentication Interception
87%
"redirected to the final stage. the final stage presented a microsoft sign - in page as part of an adversary - in - the - middle ( aitm ) attack. unlike traditional phishing, which steals credentials, aitm attacks intercept authentication sessions in real time. after clicking the …"
T1566.002Spearphishing Link
77%
"redirected to the final stage. the final stage presented a microsoft sign - in page as part of an adversary - in - the - middle ( aitm ) attack. unlike traditional phishing, which steals credentials, aitm attacks intercept authentication sessions in real time. after clicking the …"
T1557Adversary-in-the-Middle
59%
"redirected to the final stage. the final stage presented a microsoft sign - in page as part of an adversary - in - the - middle ( aitm ) attack. unlike traditional phishing, which steals credentials, aitm attacks intercept authentication sessions in real time. after clicking the …"
T1556.006Multi-Factor Authentication
56%
"redirected to the final stage. the final stage presented a microsoft sign - in page as part of an adversary - in - the - middle ( aitm ) attack. unlike traditional phishing, which steals credentials, aitm attacks intercept authentication sessions in real time. after clicking the …"

Summary

A highly sophisticated phishing campaign leveraging code-of-conduct-themed lures has targeted more than 35,000 users across 13,000 organizations. The multi-stage attack, observed between April 14 and April 16, 2026, highlights how threat actors are refining social engineering, delivery infrastructure, and authentication abuse to bypass modern defenses. The campaign primarily impacted users in the United States, accounting […]

The post Code of Conduct Phish Hits 35,000 Users in Multi-Stage AiTM Attack appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.