From Panic to Token Theft: Multi-Stage AiTM Phishing
Multi-stage “code of conduct” phishing used PDF lures and CAPTCHA gating to drive victims into an AiTM proxy that stole session tokens and bypassed MFA at scale.
Multi-stage “code of conduct” phishing used PDF lures and CAPTCHA gating to drive victims into an AiTM proxy that stole session tokens and bypassed MFA at scale.