Microsoft issues warning against dangerous new phishing campaign

Hook on Keyboard
(Image credit: wk1003mike / Shutterstock)

The Microsoft 365 Defender Threat Intelligence Team has revealed details about a large-scale phishing operation it discovered while investigating recent campaigns against businesses.

Named BulletProofLink, the Phishing-as-a-service (PhaaS) operation sells phishing kits, email templates, hosting, and automated services at a relatively low cost.

“In researching phishing attacks, we came across a campaign that used a rather high volume of newly created and unique subdomains—over 300,000 in a single run. This investigation led us down a rabbit hole as we unearthed one of the operations that enabled the campaign,” share the researchers.

TechRadar needs yo...

We're looking at how our readers use VPNs with streaming sites like Netflix so we can improve our content and offer better advice. This survey won't take more than 60 seconds of your time, and we'd hugely appreciate if you'd share your experiences with us.

>> Click here to start the survey in a new window <<

No honor among thieves

Known as BulletProofLink, BulletProftLink, and Anthrax, the service is currently advertised on underground cybercrime forums, and builds on the demand for phishing kits to a whole new level.

In addition to offering hundreds of phishing templates that mimic popular brands and services, BulletProofLink also offers additional conveniences as well such as hosting and email-sending services.

The PhaaS can be employed in either one-off or monthly subscription-based business models to ensure that it suits the budgets of all kinds of threat actors, around the world.

Interestingly, Microsoft researchers also observed that BulletProofLink keeps copies of the credentials phished by its customers, which it then presumably hawks in other underground marketplaces.

Mayank Sharma

With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’s TechRadar Pro’s expert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.