New Attack Vector: ADFS and Office.com Exploited for Microsoft 365 Credential Thef
A new phishing campaign is making waves in the cybersecurity community, targeting Microsoft 365 users by exploiting Microsoft’s own Active Directory Federation Services (ADFS). What makes this attack particularly dangerous is that it uses legitimate office.com links as part of the lure, giving victims a false sense of security before redirecting them to malicious login pages.
How the Attack Works
Researchers at Push Security uncovered this campaign, noting that it represents a major evolution in phishing techniques. Instead of relying on suspicious emails or obvious fake websites, the attackers are leveraging malvertising—malicious ads placed on search engines.
For example, a user searching for “Office 365” may see a sponsored link that looks completely legitimate. Clicking it takes them to a genuine outlook.office.com URL. However, that URL is carefully crafted to trigger a redirect controlled by the attackers.
The key lies in abusing ADFS, which normally provides single sign-on (SSO) by connecting local directories with Microsoft’s cloud services. In this case, the attackers set up their own Microsoft tenant and manipulated its ADFS configuration to send authentication requests to a phishing domain.
This means that Microsoft’s own servers are effectively helping redirect users from a trusted office.com domain to a pixel-perfect clone of the Microsoft login page. As one Push Security researcher explained, “It’s basically the equivalent of Outlook.com having an open redirect vulnerability.”
Why It’s So Effective
This technique, sometimes referred to as “ADFSjacking,” is particularly insidious because the initial redirect comes directly from Microsoft’s infrastructure. URL-based security filters are unlikely to flag it, and even savvy users may not notice anything suspicious.
To further complicate detection, the attackers use a multi-stage redirect chain. In one case, traffic flowed through an unrelated website (a fake travel blog) before landing on the phishing page. This extra hop helps evade automated domain categorization tools and web filters.
Once victims arrive at the fake login page, the attackers use an Attacker-in-the-Middle (AitM) proxy setup to capture credentials in real time. Beyond stealing usernames and passwords, this also allows them to grab session cookies, which can bypass Multi-Factor Authentication (MFA) and give full access to accounts.
Shifting Tactics in Phishing Campaigns
This campaign highlights a broader shift in phishing tactics. Instead of relying solely on email—which is now heavily protected by secure email gateways—attackers are moving to channels like search engine ads, social media, and instant messaging. These alternative delivery methods allow them to sidestep traditional security defenses.
How to Defend Against It
Security teams should take proactive steps to detect and mitigate this type of attack:
-
Monitor network logs for unusual ADFS redirects, especially those leading to domains outside your organization.
-
Filter for suspicious Google Ad parameters in traffic directed to office.com.
-
Deploy reputable ad blockers across corporate browsers to reduce exposure to malvertising.
-
Educate employees about the risk of clicking sponsored search results and encourage them to bookmark trusted Microsoft login portals.
This campaign serves as a stark reminder that attackers are always innovating, even turning trusted platforms against users. Defenders will need to stay one step ahead by expanding monitoring beyond email and applying layered defenses across web browsing, identity, and authentication systems.
Comments
Post a Comment