HomeIntelligenceBrief
BREACH BRIEF🟠 High ThreatIntel

Phishing Campaigns Exploit MFA Workflows and Internal Email Trust, Targeting Enterprises in 2025

Cisco Talos observed a surge in phishing attacks that hijack MFA processes and abuse Microsoft 365 Direct Send to spoof internal devices. The trend threatens any organization that relies on MFA and internal email for vendor communication, making third‑party risk management a priority.

LiveThreat™ Intelligence · 📅 April 22, 2026· 📰 blog.talosintelligence.com
🟠
Severity
High
TI
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
4 sector(s)
Actions
4 recommended
📰
Source
blog.talosintelligence.com

Phishing Campaigns Exploit MFA Workflows and Internal Email Trust, Targeting Enterprises in 2025

What Happened — In 2025 attackers shifted phishing tactics toward multi‑factor authentication (MFA) workflows, using compromised credentials to launch “cascaded” phishing attacks from trusted internal accounts. They also abused Microsoft 365 Direct Send to spoof internal devices, delivering convincing lures without ever compromising a real mailbox.

Why It Matters for TPRM

  • MFA‑centric phishing bypasses traditional password‑only defenses, raising the risk profile of any third‑party that relies on MFA for access.
  • Spoofed internal emails erode trust in supply‑chain communications, increasing the likelihood of credential or token theft from vendors and partners.

Who Is Affected — All industries that employ MFA and Microsoft 365 for collaboration, especially SaaS providers, MSPs, and IAM vendors.

Recommended Actions

  • Verify that MFA implementations enforce phishing‑resistant methods (e.g., FIDO2, hardware tokens).
  • Harden Microsoft 365 Direct Send settings and enforce strict sender authentication for internal devices.
  • Conduct phishing‑simulation training that includes internal‑spoof scenarios and MFA‑token awareness.

Technical Notes — Attack vector: phishing emails (including internal Direct Send spoofing) → credential compromise → MFA token harvesting. No specific CVE cited. Data at risk includes privileged credentials, SSO tokens, and downstream service access. Source: Cisco Talos Intelligence

📰 Original Source
https://blog.talosintelligence.com/phishing-and-mfa-exploitation-targeting-the-keys-to-the-kingdom/

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.