Underground PhaaS platform VENOM targets C-suite executives. Phishing emails mimic Microsoft SharePoint with Base64-encoded fragments and QR codes. AI-driven in-the-middle and device-code tactics harvest credentials and bypass MFA.
| IOC Type | Value | Description | Relevant MITRE ATT&CK Techniques |
|---|
| Code | Title |
|---|---|
| T1566.002 | Spearphishing Link used to deliver malicious QR code and Base64-encoded email fragment |
| T1071.001 | Application Layer Protocol: Web Protocols - Application Layer Protocol: Web Protocols for hosting phishing landing page |
| T1078 | Valid Accounts - Use of compromised credentials to access victim accounts |
| T1098 | Account Manipulation - Creation of new devices and token registration |
| T1114 | Email Collection - Crafting personalized email threads to increase credibility |
| Type | Value |
|---|---|
| Region | Global |
| Sector | C-suite executives across multiple industries |
Threat actors using a previously undocumented phishing-as-a-service (PhaaS) platform called “VENOM” are targeting credentials of
VENOM's AiTM method Source: Abnormal Apart from the adversary-in-the-middle (AiTM) method, Abnormal has also observed a device-code phishing tactic in which the victim is tricked into approving access to their Microsoft account for a rogue device. The device code attack method Source: Abnormal This method has become very popular over the past year due to its effectiveness and resistance to password resets, with at least 11 phishing kits currently offering it as an option. In both methods, VENOM quickly establishes persistent access during the authentication process. In the AiTM flow, it registers a new device on the victim’s account. In the device code flow, it obtains a token that also provides access to the account. The researchers note that MFA is no longer sufficient as a defense. C-suite executives should use FIDO2 authentication, disable the device code flow when not needed, and block token abuse by implementing stricter conditional access policies.