Cybercriminals are exploiting an AI-powered presentation tool called Gamma to launch a multi-stage attack aimed at stealing Microsoft credentials.
This attack route is designed not only to evade traditional security measures but also to deceive human recipients by leveraging trusted platforms and services.
Cyber attackers are taking advantage of Gamma, a lesser-known but increasingly used platform for creating presentations, to host malicious content.
Here’s how the attack unfolds:
This phishing campaign is notable for several reasons:
The attackers’ use of an AiTM framework is particularly alarming. This setup allows them to not only harvest credentials but also capture session cookies, enabling attackers to bypass Multi-Factor Authentication (MFA) and gain unauthorized access to the victim’s account.
The layered approach of this attack, starting from a legitimate sender, through to a reputable service like Gamma, then a trusted security tool, and finally to a convincing fake login, makes it challenging to detect:
According to the Report, this campaign underscores the importance of moving beyond traditional rule-based email security.
AI and behavioral analysis are becoming critical in identifying and stopping such nuanced phishing attempts.
Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!
Security researchers Nikolai Skliarenko and Yazhi Wang of Trend Micro’s Research Team have disclosed critical…
Critical vulnerability in Apache ActiveMQ (CVE-2024-XXXX) exposes brokers to denial-of-service (DoS) attacks by allowing malicious…
Cybersecurity researchers at Kaspersky have identified a new supply chain vulnerability emerging from the widespread…
UK government has unveiled plans to implement passkey technology across its digital services later this…
Significant blow to cybercriminal infrastructure, Europol has coordinated an international operation resulting in the arrest…
Patched Windows zero-day vulnerability (CVE-2025-29824) in the Common Log File System (CLFS) driver was exploited…