A new phishing-as-a-service (PhaaS) scheme called Sneaky Log targets Microsoft 365 and bypasses two-factor authentication (2FA).
The scheme involves fake authentication pages, Cloudflare turnstile verification, credential harvesting, account access, and redirection to legitimate Microsoft pages.
Businesses are advised to strengthen MFA, implement advanced threat protection (ATP), and educate their workforce to mitigate the threat.
Microsoft 365 is frequently targeted due to its wide usage, highlighting the need for organizations to stay proactive in cybersecurity strategies.