HomeIntelligenceBrief
🔓 BREACH BRIEF🟠 High🔍 ThreatIntel

Phishing‑as‑a‑Service “VENOM” Harvests Microsoft Logins from C‑Suite Executives

A covert phishing‑as‑a‑service platform named VENOM is delivering highly personalized SharePoint‑style emails to CEOs, CFOs and VPs. The campaign uses QR codes and double‑Base64‑encoded URLs to bypass logging, then proxies Microsoft login pages to steal credentials and MFA tokens, posing a significant third‑party risk.

🛡️ LiveThreat™ Intelligence · 📅 April 10, 2026· 📰 bleepingcomputer.com
🟠
Severity
High
🔍
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
5 sector(s)
Actions
4 recommended
📰
Source
bleepingcomputer.com

Phishing‑as‑a‑Service “VENOM” Harvests Microsoft Logins from C‑Suite Executives

What Happened — Threat actors operating the closed‑access “VENOM” phishing‑as‑a‑service platform have been sending highly‑personalized SharePoint‑style emails to CEOs, CFOs and VPs. The messages embed a Unicode QR code and a double‑Base64‑encoded target address; when scanned, the victim is redirected to a credential‑harvesting page that proxies the Microsoft login flow and captures MFA tokens and session tokens.

Why It Matters for TPRM

  • Compromise of senior‑level accounts can grant attackers unrestricted access to corporate cloud resources and sensitive data.
  • The device‑code and adversary‑in‑the‑middle (AiTM) flows bypass traditional password‑reset and MFA defenses, raising the risk to downstream vendors.
  • VENOM’s closed‑access, underground nature makes detection and attribution difficult for third‑party risk teams.

Who Is Affected — Enterprises across finance, technology, healthcare, professional services, and other sectors that rely on Microsoft 365 for executive communications.

Recommended Actions — Review executive account protection, enforce FIDO2‑only MFA, disable the Microsoft device‑code flow where unnecessary, and implement stricter conditional‑access policies. Conduct a vendor‑risk assessment of any third‑party services with delegated access to Microsoft APIs.

Technical Notes — Attack vector: spear‑phishing with QR‑code and URL‑fragment obfuscation; no known CVE. Data exfiltrated: Microsoft credentials, MFA codes, session tokens. Source: BleepingComputer

📰 Original Source
https://www.bleepingcomputer.com/news/security/new-venom-phishing-attacks-steal-senior-executives-microsoft-logins/

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.