Sophisticated Phishing Campaign Exploiting Microsoft 365 Infrastructure
By leveraging legitimate Microsoft domains and tenant misconfigurations, attackers conduct Business Email Compromise (BEC) operations, tricking users to provide information while maintaining a high degree of legitimacy.