Signal
Threat Actor Targeting VPN Users in New Credential Theft Campaign
The Rapid7 MDR team is currently monitoring an increase in phishing campaigns where threat actors (TAs) impersonate internal IT departments via Microsoft Teams.
rss
microsoft_teams
Evidence locked
Today's free sample is only available for the edition's flagship signal.
Evidence preview
- Microsoft reports Storm-2561 campaign using fake VPN clients for credential theftSC Media
- Help on the line: How a Microsoft Teams support call led to compromiseMicrosoft Security Blog
- Rapid7 Guidance on Observed Microsoft Teams Phishing CampaignsRapid7 Blog
- Security Firm Executive Targeted in Sophisticated Phishing AttackSecurityWeek
- Threat Actor Targeting VPN Users in New Credential Theft CampaignSecurityWeek