1/27/26: Recent Threats & Social Engineering Trends

Image depicting phone usage

Adaptive “Vishing” + Phishing Kits Target SSO Accounts

Sophisticated phishing infrastructure, often paired with voice‑based social engineering
(“vishing”), is now being used to attack single sign-on (SSO) systems for major providers
like Google, Microsoft, and Okta. These kits dynamically tailor phishing pages and spoof IT
support calls to harvest credentials - even bypassing weaker MFA. Attackers combine
contextual reconnaissance with live phone interaction, increasing trust and reducing
suspicion.

How PhishingBox helps:

  • Simulated phishing campaigns that mimic evolving real‑world lures and
    messages train employees to spot subtle, multi‑channel attack attempts.
  • Behavioral risk analytics identify users who engage with advanced phishing kits
    so you can target specific retraining.

Microsoft Teams Adds Brand‑Spoof Call Warnings

In response to rising brand impersonation and social engineering scams, Microsoft Teams
will begin alerting users about suspicious external callers trying to pretend to be trusted
brands.

How PhishingBox helps:

  • Awareness training modules that cover brand spoofing and verification best
    practices - teaching employees to verify unexpected contacts.
  • Reporting workflows that encourage users to flag suspicious calls or messages
    internally.

AiTM & Multi‑Stage Phishing at Scale

Microsoft warns of adversary‑in‑the‑middle (AiTM) phishing operations targeting sectors
like energy, where phishing emails lead to fake login portals for SharePoint and OneDrive- harvesting credentials and hijacking inbox settings for persistence.

How PhishingBox helps:

  • Advanced simulated phishing templates that replicate AiTM tactics to raise
    awareness.
  • Multi‑vector attack resistance training emphasizing MFA, conditional access
    awareness, and reporting.

Password Manager Users Targeted by Urgency‑Driven Email Scam

LastPass customers have been targeted by a coordinated phishing campaign that uses
urgency (“backup your vault now”) and authoritative tones to push users toward a spoofed
login page - classic psychological manipulation.

PhishingBox mitigation:

  • Realistic urgency‑based phishing simulations help reinforce skepticism and
    validation behaviors.
  • Education on phishing indicators (domain mismatches, unsolicited requests)
    reduces click‑through risk.

Business Email Compromise by Email Address Spoof

A subtle email domain alteration resulted in a ~$16,000 fraudulent payment by the
Connecticut Port Authority - illustrating that even slight inconsistencies can trick human
reviewers.

PhishingBox application:

  • Targeted phishing awareness campaigns that include domain spoof and typo variants.
  • Policy training on payment verification and multi‑party confirmation before
    transfers.

Massive Credential Database Exposure Amplifies Phishing Threats

A large unsecured database with ~150 million credentials spanning Gmail, Yahoo,
Facebook, and more was exposed. These credentials can fuel targeted phishing and
credential‑stuffing campaigns.

Mitigation with PhishingBox:

  • Credential reuse awareness training paired with simulated risk scenarios.
  • Reporting incentives for users to flag unfamiliar login alerts or notifications.

Key Takeaway

Social engineering remains the dominant vector in 2026, amplified by AI, multi‑channel tactics, and trust exploitation. The attackers’ goal is no longer purely technical compromise - it is psychological manipulation of users to hand over credentials, authorize transactions, or provide access. As attackers innovate, organizations must strengthen the human layer of defense with continuous training, measurement, and reinforcement - exactly where PhishingBox tools deliver strategic value.