Hacker Steals $24.5 Million in Major Resolv DeFi Platform Breach

 



AI-Powered Phishing Surge Exploits Microsoft Authentication, Targets Thousands

In a concerning shift in cyberattack tactics, security researchers have uncovered a large-scale phishing campaign leveraging artificial intelligence to generate highly customized lures. The campaign, which intensified sharply in early March, is being described as one of the most aggressive and effective phishing operations seen in recent times.


 Sudden Spike in Phishing Activity

Initially, the attack campaign targeted a few dozen victims daily. However, beginning March 3, researchers observed a dramatic escalation in activity.

Unlike traditional phishing campaigns, this operation stood out due to its sophistication and scale. Each phishing email appeared unique—featuring different domains, formats, and messaging styles—making detection significantly harder.

Security experts believe attackers may have used AI tools to automatically generate these variations, enabling them to bypass conventional email security filters.

The volume and effectiveness of the campaign suggested a major shift in how phishing attacks are being executed.

 Diverse and Deceptive Attack Methods

The attackers deployed a wide range of phishing techniques, including:

  • Fake file download links
  • QR code-based lures
  • Compromised file-sharing platforms
  • Traditional email-based social engineering

This diversity made it difficult for organizations to identify patterns or block the attacks effectively.

 Exploiting Microsoft Device Authentication

At the core of the campaign is the abuse of Microsoft OAuth device authentication flow, commonly used by devices such as smart TVs, printers, and terminals.

This method allows attackers to:

  • Gain valid authentication tokens
  • Bypass passwords and multi-factor authentication (MFA)
  • Maintain access for up to 90 days

Once access is granted, attackers can potentially move laterally within compromised environments.

🏢 Widespread Impact Across Industries

Security firm Huntress reported that hundreds of its customers were affected, though the actual number of victims is likely much higher—possibly in the thousands.

The impacted sectors include:

  • Construction and trade
  • Legal firms
  • Nonprofits
  • Real estate
  • Manufacturing
  • Finance and insurance
  • Healthcare
  • Government and public safety

This broad targeting indicates the campaign was opportunistic rather than industry-specific.

 Abuse of Cloud Infrastructure

Researchers also discovered that attackers leveraged Railway, a Platform-as-a-Service (PaaS), to deploy phishing infrastructure.

By using such platforms, attackers were able to:

  • Rapidly spin up phishing environments
  • Use legitimate cloud IP addresses
  • Evade detection systems
  • Scale operations quickly

All observed malicious traffic in this campaign was traced back to Railway’s infrastructure.

In response, Railway took action by:

  • Blocking malicious domains
  • Suspending associated accounts
  • Investigating abuse patterns

However, the attackers’ ability to avoid detection highlights limitations in automated fraud detection systems.

Detection Challenges and Response

One of the key challenges in stopping this campaign was the absence of repeatable indicators such as:

  • Reused domains
  • Shared infrastructure
  • Duplicate phishing templates

This made traditional detection methods far less effective.

To mitigate risk, Huntress implemented a large-scale defensive measure by updating conditional access policies across tens of thousands of Microsoft cloud environments—blocking suspicious traffic linked to the campaign.

Rise of AI-Driven Cybercrime

This incident highlights a growing concern in cybersecurity: the increasing use of AI by cybercriminals.

Traditionally, advanced attack techniques were associated with state-sponsored actors. However, AI is now enabling even low-level attackers to:

  • Automate phishing campaigns
  • Generate realistic and varied attack content
  • Scale operations rapidly

Experts warn that this democratization of cyberattack tools could significantly increase the volume and success rate of attacks.

No comments:

Hacker Steals $24.5 Million in Major Resolv DeFi Platform Breach

  AI-Powered Phishing Surge Exploits Microsoft Authentication, Targets Thousands In a concerning shift in cyberattack tactics, security rese...