HR Emails Are the New Phishing Bait — And MFA Won’t Save You

An adversary-in-the-middle phishing campaign hit 35,000 workers across 13,000 organizations in 48 hours, using fake HR emails to bypass MFA and steal Microsoft tokens.
HR Emails Are the New Phishing Bait — And MFA Won’t Save You
Table of Contents
    Add a header to begin generating the table of contents

    In 48 hours across late April 2026, a phishing campaign targeting 35,000 employees at more than 13,000 organizations demonstrated that multi-factor authentication — the security control that enterprises have spent the past five years deploying as their primary identity defense — offers no meaningful protection against the latest generation of credential theft infrastructure.

    The Anatomy of a Modern Phishing Campaign

    Microsoft detailed the campaign, which unfolded over April 14–16, 2026. It reached targets across 26 countries, with 92 percent of targeted users located in the United States. The sectors most heavily targeted were professional services, technology firms, healthcare, and financial services.

    The attack began with email. Messages arrived from legitimate email delivery infrastructure, meaning they did not originate from obvious attacker-controlled domains. Display names were crafted to appear as internal HR communications. The content warned recipients of a code of conduct violation — the kind of message designed to create urgency and anxiety, motivating a quick click rather than careful scrutiny.

    The emails carried attached PDF documents. Those attachments, rather than containing malicious executable code, contained hyperlinks. The links passed through multiple CAPTCHA challenge pages — a deliberate tactic to slow automated analysis tools and add a veneer of legitimacy before reaching the credential harvesting page.

    Why MFA Did Not Protect These Users

    Traditional multi-factor authentication — a one-time code generated by an authenticator app, a push notification, or an SMS message — is designed to prevent account takeover when only a password has been stolen. The assumption is that the attacker does not have access to the second factor.

    Adversary-in-the-middle (AiTM) infrastructure defeats that assumption entirely. Rather than directing the victim to a fake login page that simply captures credentials, AiTM tools sit between the victim and the real Microsoft authentication service. The victim’s browser communicates with the AiTM proxy, which relays requests to the real authentication server in real time. The victim enters their password and their MFA code. The proxy intercepts and forwards everything, then captures the authenticated session token the real Microsoft server issues.

    The stolen token represents a live, authenticated session. The attacker can use it to access Microsoft services — email, SharePoint, Teams, connected enterprise applications — without ever knowing the victim’s password or possessing the MFA device. The MFA event appears successful in authentication logs because the victim completed it legitimately.

    How Tycoon 2FA Made Large-Scale AiTM Attacks Accessible to Any Attacker

    The campaign used Tycoon 2FA, a Phishing-as-a-Service platform available on cybercriminal markets. PhaaS platforms provide pre-built attack infrastructure — the AiTM proxy, the phishing page templates, the CAPTCHA handling, the token interception logic — as a managed service. An attacker subscribes, configures a campaign, and deploys at scale without needing to build the underlying technical components.

    The operational efficiency this enables is substantial. A 48-hour campaign hitting 35,000 targets at 13,000 organizations is not the work of a sophisticated state-sponsored group writing custom tools. It is the output of a commercial crime platform designed to make large-scale credential theft accessible to attackers with limited technical depth.

    The implication for defenders is that the technical sophistication barrier for MFA bypass has effectively been removed. Any phishing operator with access to Tycoon 2FA or comparable platforms can now run AiTM campaigns.

    What Actually Stops AiTM Attacks

    The only multi-factor authentication method that provides meaningful protection against AiTM is FIDO2, which encompasses hardware security keys and passkeys. FIDO2 authentication is cryptographically bound to the specific domain the user is visiting. Even if an AiTM proxy intercepts the authentication flow, it cannot satisfy the cryptographic challenge because the domain it presents is different from the legitimate service’s domain. The authentication fails at the attacker’s proxy.

    Software-based TOTP authenticator apps, push notification MFA, and SMS codes do not provide this protection — they can all be relayed through an AiTM proxy in real time.

    Organizations that have deployed software-based MFA and consider their authentication risk addressed need to recalibrate that assessment.

    Moving to FIDO2: The Only Reliable Defense Against Tycoon 2FA Campaigns

    The immediate defensive actions vary by organization, but the hierarchy is clear:

    Transition to FIDO2/passkey authentication for high-value accounts — executives, privileged administrators, finance personnel, anyone with access to sensitive data or systems. Hardware keys are more resistant than platform passkeys, but both are significantly better than software TOTP.

    Implement Conditional Access policies that evaluate session characteristics beyond the initial authentication event. Anomalous sign-in locations, device compliance status, and behavioral signals can detect compromised sessions even after a valid token is stolen.

    Audit session token lifetimes. Shorter-lived tokens reduce the window an attacker has to use a stolen session before it expires. This does not prevent token theft but limits its utility.

    The 35,000-person scale of this campaign in two days is a benchmark for what commercially available attack infrastructure can achieve. Defenses calibrated to the threat of three years ago are not adequate for the threat today.

    Related Posts