FraudHIGH

New Phishing Platform - Credential Theft Targeting Executives

Featured image for New Phishing Platform - Credential Theft Targeting Executives
IMInfosecurity Magazine
Venomcredential theftphishingC-suiteAbnormal
🎯

Basically, a new phishing tool is tricking top executives into giving away their passwords.

Quick Summary

A new phishing platform named Venom is targeting C-suite executives, leading to widespread credential theft. This sophisticated campaign uses advanced evasion tactics, raising serious security concerns. Organizations must reassess their defenses against such threats.

What Happened

A significant credential theft campaign has been uncovered, targeting C-suite executives and senior personnel at major organizations globally. Researchers at Abnormal identified this operation, which ran from November 2025 to March 2026, as being powered by a previously undocumented phishing-as-a-service (PhaaS) platform named Venom.

How It Works

The campaign utilized SharePoint document-sharing notifications as lures, enticing CEOs, CFOs, and other high-ranking officials from over 20 industries. These notifications were crafted around financial reports, encouraging targets to scan a QR code embedded in the email. To evade detection, the phishing emails employed multiple tactics, including randomized HTML elements and fabricated email threads that mimicked legitimate corporate communication. This personalization made it challenging for spam filters to catch the malicious emails.

Who's Being Targeted

The primary targets of this campaign are senior executives, specifically those in C-suite roles. This demographic is often seen as a lucrative target due to their access to sensitive company information and decision-making power. The attackers aimed to exploit their trust and familiarity with corporate communication, making them more susceptible to the phishing attempts.

Signs of Infection

Victims who scanned the QR code were directed to a fake verification page designed to filter out non-human traffic. If they passed the checks, they were routed to a credential harvester. The campaign utilized two main methods for credential theft: 1) an adversary-in-the-middle (AiTM) setup that mimicked the victim's real login portal, and 2) a method that tricked victims into approving a device sign-in through Microsoft’s legitimate device code flow.

How to Protect Yourself

Organizations should reassess their reliance on multi-factor authentication (MFA) as a final barrier against such sophisticated attacks. The Venom platform demonstrates that MFA can be rendered ineffective if attackers can silently register secondary devices or exploit valid tokens even after password changes. Companies are encouraged to implement stronger security measures, such as continuous monitoring of account activity and immediate revocation of all active sessions after a breach.

What You Should Do

Given the advanced nature of the Venom PhaaS, organizations must be proactive in their cybersecurity strategies. This includes training employees to recognize phishing attempts, especially those that appear to come from trusted sources. Additionally, regular updates and patches to security systems can help defend against emerging threats like Venom. The discovery of this platform indicates that such capabilities may proliferate, making it crucial for companies to stay vigilant.

🔒 Pro insight: The emergence of Venom signifies a shift towards more sophisticated phishing operations, necessitating enhanced security protocols for executive-level communications.

Original article from

IMInfosecurity Magazine
Read Full Article

Related Pings

HIGHFraud

Phishing Campaign - Hackers Steal Bank Credentials in Philippines

A new phishing campaign is targeting banking customers in the Philippines. Hackers are using trusted platforms to steal credentials and drain accounts. Stay alert and verify emails to protect your finances.

Cyber Security News·
HIGHFraud

Nigerian Romance Scammer Jailed After Fellow Fraudster Exposed Him

A Nigerian romance scammer has been sentenced to 15 years in prison after being caught by another fraudster. His schemes exploited victims for over $1.5 million. This case underscores the dangers of online scams and the emotional manipulation involved.

Graham Cluley·
CRITICALFraud

North Korean Hackers Drain $285 Million From Drift in Sophisticated Attack

A sophisticated attack attributed to North Korean hackers has drained $285 million from the Drift DeFi platform, marking one of the largest hacks of the year. The operation involved advanced techniques and meticulous planning.

SecurityWeek·
HIGHFraud

Drift Loses $285 Million in Social Engineering Attack

Drift, a Solana-based decentralized exchange, lost $285 million in a social engineering attack linked to North Korean hackers. This incident highlights the increasing sophistication of crypto theft tactics. Users are urged to monitor their accounts and stay informed about security measures being implemented.

The Hacker News·
HIGHFraud

Windows Extortion Plot - Engineer Pleads Guilty to Charges

A former engineer has pleaded guilty to locking Windows admins out of servers in an extortion scheme. This incident underscores the risks of insider threats. Rhyne's actions could lead to a 15-year prison sentence. Companies must strengthen their cybersecurity measures to prevent similar attacks.

BleepingComputer·
HIGHFraud

Drift Protocol - North Korean Hackers Steal $280 Million

North Korean hackers have stolen $280 million from the Drift Protocol by manipulating admin powers. This attack has frozen operations, affecting thousands of traders. Drift is investigating and working to recover the funds.

BleepingComputer·