Microsoft Details Phishing Campaign Targeting 35,000 Users Across 26 Countries

Summary: Microsoft disclosed a phishing campaign that affected more than 35,000 users across 26 countries, using polished lures, legitimate email services, and evasion techniques to steal credentials and session access.

Microsoft has published details on a broad phishing campaign that targeted more than 35,000 users across 26 countries, offering another illustration of how mature credential theft operations have become. The campaign combined social-engineering themes, legitimate-looking infrastructure, and layered evasion tactics to compromise users who might have ignored older, noisier phishing attempts.

One of the most important details is scale. When a campaign reaches tens of thousands of users across multiple sectors and geographies, it is no longer a narrow spam operation. It is an organized access effort with enough operational discipline to segment targets, rotate infrastructure, and keep enough credibility to draw victims through the full attack chain.

According to Microsoft's findings, 92% of the victims were in the United States, with healthcare, life sciences, financial services, professional services, and technology among the most affected sectors. Attackers used lures tied to codes of conduct and flattering or curiosity-driven themes, then added CAPTCHA steps and intermediate pages to slow down automated analysis and make the phishing flow look more legitimate.

That matters because phishing has moved well beyond badly formatted credential forms. Campaigns increasingly rely on legitimate cloud services, realistic pages, and session-oriented tactics designed to beat both user instincts and automated defenses. Microsoft also noted the continued rise of QR-code phishing, which pushes users from email to mobile devices and can bypass some of the guardrails organizations built around desktops and browsers.

For defenders, the lesson is that awareness alone is not enough. Detection needs to account for legitimate services being abused as attack infrastructure, while identity controls need to focus on session risk and resistant authentication methods where possible. The campaign is a reminder that credential theft remains one of the most scalable and profitable paths into enterprise environments.

Key facts

  • Microsoft said the campaign targeted more than 35,000 users in 26 countries.
  • Roughly 92% of victims were located in the United States.
  • Healthcare, life sciences, financial services, professional services, and technology were among the most affected sectors.
  • The phishing flow used themed lures, CAPTCHA steps, and intermediate pages to evade automated defenses.

Why it matters

A campaign of this size threatens sensitive organizations across multiple industries and shows how phishing operations are adapting to modern defenses. Abuse of legitimate services, polished social engineering, and QR-based delivery make credential theft harder to detect and easier to scale.

Key metrics

  • Usuarios afectados: >35,000
  • Países afectados: >26
  • Víctimas en EE. UU.: >92% %
  • Ataques basados en códigos QR: 146% de aumento % (Durante el período de enero a marzo de 2026.)
X profile@thehackersnewshttps://twitter.com/thehackersnews
Embedded content for: Microsoft Details Phishing Campaign Targeting 35,000 Users Across 26 Countries