New Phishing Threats: MFA Bypass, Fake CAPTCHA & AI Scams
Explore the latest phishing threats, including MFA bypass kits, fake CAPTCHA malware, and AI-driven scams, and how organizations can reduce social engineering risk.

Sophisticated phishing infrastructure, often paired with voice‑based social engineering
(“vishing”), is now being used to attack single sign-on (SSO) systems for major providers
like Google, Microsoft, and Okta. These kits dynamically tailor phishing pages and spoof IT
support calls to harvest credentials - even bypassing weaker MFA. Attackers combine
contextual reconnaissance with live phone interaction, increasing trust and reducing
suspicion.
How PhishingBox helps:
In response to rising brand impersonation and social engineering scams, Microsoft Teams
will begin alerting users about suspicious external callers trying to pretend to be trusted
brands.
How PhishingBox helps:
Microsoft warns of adversary‑in‑the‑middle (AiTM) phishing operations targeting sectors
like energy, where phishing emails lead to fake login portals for SharePoint and OneDrive-
harvesting credentials and hijacking inbox settings for persistence.
How PhishingBox helps:
LastPass customers have been targeted by a coordinated phishing campaign that uses
urgency (“backup your vault now”) and authoritative tones to push users toward a spoofed
login page - classic psychological manipulation.
PhishingBox mitigation:
A subtle email domain alteration resulted in a ~$16,000 fraudulent payment by the
Connecticut Port Authority - illustrating that even slight inconsistencies can trick human
reviewers.
PhishingBox application:
A large unsecured database with ~150 million credentials spanning Gmail, Yahoo,
Facebook, and more was exposed. These credentials can fuel targeted phishing and
credential‑stuffing campaigns.
Mitigation with PhishingBox:
Social engineering remains the dominant vector in 2026, amplified by AI, multi‑channel tactics, and trust exploitation. The attackers’ goal is no longer purely technical compromise - it is psychological manipulation of users to hand over credentials, authorize transactions, or provide access. As attackers innovate, organizations must strengthen the human layer of defense with continuous training, measurement, and reinforcement - exactly where PhishingBox tools deliver strategic value.