
Security Brief: Phishing Campaigns Use Real-Time Validation for Credential Theft
Who: Threat actors employing advanced phishing techniques, tracked by Cofense and Ontinue. Related activity linked to clusters Storm-1811 and STAC5777.
What: A new tactic dubbed “precision-validating phishing” uses real-time email validation to display fake login pages only to verified, high-value email accounts. This approach improves success rates and evades detection by security tools. Additional phishing lures use file deletion notices to deliver malware or direct users to bogus Microsoft login pages. In a separate campaign, attackers used Microsoft Teams messages and Quick Assist for remote access and multi-stage compromise.

Impact:
Credential theft from real, active accounts with higher resale/exploitation value.
Malware delivery via fake OneDrive installers using ScreenConnect remote access.
Extended phishing campaign lifespans due to evasion of automated analysis.
Persistence and remote access achieved using legitimate tools (e.g., TeamViewer, Node.js).
Action Needed:
Educate users on new phishing tactics and suspicious file deletion lures.
Disable unused collaboration tools like Quick Assist.
Monitor for abnormal remote access activity and unauthorized use of tools like TeamViewer.
Read the full article HERE