January 2026: Recent Threats & Social Engineering Trends
A breakdown of 2026’s top social engineering threats, including phishing, vishing, AiTM attacks, and credential exposure—and how to reduce risk.

Sophisticated phishing infrastructure, often paired with voice‑based social engineering
(“vishing”), is now being used to attack single sign-on (SSO) systems for major providers
like Google, Microsoft, and Okta. These kits dynamically tailor phishing pages and spoof IT
support calls to harvest credentials - even bypassing weaker MFA. Attackers combine
contextual reconnaissance with live phone interaction, increasing trust and reducing
suspicion.
How PhishingBox helps:
In response to rising brand impersonation and social engineering scams, Microsoft Teams
will begin alerting users about suspicious external callers trying to pretend to be trusted
brands.
How PhishingBox helps:
Microsoft warns of adversary‑in‑the‑middle (AiTM) phishing operations targeting sectors
like energy, where phishing emails lead to fake login portals for SharePoint and OneDrive-
harvesting credentials and hijacking inbox settings for persistence.
How PhishingBox helps:
LastPass customers have been targeted by a coordinated phishing campaign that uses
urgency (“backup your vault now”) and authoritative tones to push users toward a spoofed
login page - classic psychological manipulation.
PhishingBox mitigation:
A subtle email domain alteration resulted in a ~$16,000 fraudulent payment by the
Connecticut Port Authority - illustrating that even slight inconsistencies can trick human
reviewers.
PhishingBox application:
A large unsecured database with ~150 million credentials spanning Gmail, Yahoo,
Facebook, and more was exposed. These credentials can fuel targeted phishing and
credential‑stuffing campaigns.
Mitigation with PhishingBox:
Social engineering remains the dominant vector in 2026, amplified by AI, multi‑channel tactics, and trust exploitation. The attackers’ goal is no longer purely technical compromise - it is psychological manipulation of users to hand over credentials, authorize transactions, or provide access. As attackers innovate, organizations must strengthen the human layer of defense with continuous training, measurement, and reinforcement - exactly where PhishingBox tools deliver strategic value.