HomeIntelligenceBrief
🔓 BREACH BRIEF🟠 High🔍 ThreatIntel

Phishing Campaign Bypasses MFA on Microsoft 365, Threatening Hundreds of Organizations in Five Countries

A global phishing operation is exploiting a legitimate Microsoft 365 login flow to capture MFA codes, compromising accounts at hundreds of organizations across five nations. The technique erodes the effectiveness of MFA, a cornerstone control for third‑party risk programs.

🛡️ LiveThreat™ Intelligence · 📅 March 27, 2026· 📰 techrepublic.com
🟠
Severity
High
🔍
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
3 sector(s)
Actions
4 recommended
📰
Source
techrepublic.com

Phishing Campaign Bypasses MFA on Microsoft 365, Affecting Hundreds of Organizations Across 5 Countries

What Happened — A coordinated phishing operation leveraged a legitimate Microsoft 365 login feature to capture MFA codes, allowing attackers to obtain valid session tokens. The campaign was observed in five countries and compromised accounts at hundreds of organizations.

Why It Matters for TPRM

  • MFA bypasses undermine a core security control many third‑party risk programs rely on.
  • Successful credential theft can lead to data exfiltration, ransomware deployment, or lateral movement within vendor environments.
  • The attack surface includes any SaaS provider that integrates with Microsoft 365 for authentication.

Who Is Affected — Cloud‑based SaaS vendors, MSPs, and any enterprise that uses Microsoft 365 for email, collaboration, or identity management.

Recommended Actions

  • Review MFA implementation and enforce conditional access policies that limit the use of “remember me” or similar features.
  • Conduct credential‑theft simulations and phishing awareness training for all users with Microsoft 365 access.
  • Verify that logging and alerting for anomalous sign‑in locations and impossible‑travel events are enabled.

Technical Notes — The attackers employed a classic credential‑phishing email that directed victims to a spoofed Microsoft login page. Once the user entered their password, the page prompted for the MFA code, which was then relayed to the attacker in real time. No new CVE was disclosed; the technique exploits the legitimate “prompt for code” flow. Data types at risk include email content, SharePoint files, and Teams communications. Source: TechRepublic Security

📰 Original Source
https://www.techrepublic.com/article/news-microsoft-365-phishing-bypasses-security-codes/

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.