Home OSINT News Signals
CYBER

Weekly Cybersecurity Review: AiTM Phishing Kits Hijack AWS, Year-Long Malware Campaign Targets HR Departments

🕓 2 min read

A sophisticated Adversary-in-The-Middle (AiTM) phishing kit has been identified as the primary tool in a campaign designed to hijack Amazon Web Services (AWS) accounts. This technique represents a significant evolution in credential theft, moving beyond simple fake login pages. In an AiTM attack, threat actors position themselves between the victim and the legitimate service. When a user enters their credentials on a phishing page, the kit instantly forwards them to the real AWS login portal, simultaneously capturing multi-factor authentication (MFA) codes or session cookies. This allows attackers to bypass MFA protections entirely, granting them full, authenticated access to corporate cloud environments. The compromised accounts are then often used to launch further attacks, mine cryptocurrency, or establish persistent footholds for data exfiltration. This campaign underscores the critical need for organizations to move beyond MFA alone and adopt phishing-resistant authentication methods, such as FIDO2 security keys, and to implement strict monitoring for anomalous activity within cloud platforms.

In a separate, extensive operation, cybersecurity researchers have uncovered a year-long malware campaign specifically targeting Human Resources (HR) departments across various industries. The attackers employ meticulously crafted phishing emails, often impersonating job applicants, to deliver malicious payloads. Once inside an HR professional's system, the malware—a variant of information-stealing malware like Agent Tesla or Remcos RAT—begins harvesting sensitive data. This includes employee Personally Identifiable Information (PII), payroll data, internal communications, and system credentials. The long duration and specific targeting suggest a financially motivated espionage operation, aiming to gather data for identity theft, corporate fraud, or sale on dark web forums. HR departments are a high-value target due to their centralized access to vast amounts of confidential personnel and financial data, making robust security training and advanced email filtering imperative for these teams.

The convergence of these two threats paints a concerning picture of the current threat landscape. Attackers are simultaneously refining large-scale, automated techniques to breach major cloud infrastructure while also executing patient, targeted campaigns against soft targets rich in data. The AWS AiTM attacks exploit a reliance on phishable MFA methods, highlighting a systemic weakness in many organizations' cloud security postures. Conversely, the HR-focused campaign demonstrates how social engineering remains devastatingly effective when paired with off-the-shelf malware. Both incidents reinforce the principle that cybersecurity is a layered defense. Technical controls like phishing-resistant MFA and endpoint detection must be complemented by continuous, role-specific security awareness training, especially for high-risk departments like HR, finance, and executive offices.

For defenders, the response must be equally multifaceted. Organizations should immediately audit their cloud environments, particularly administrator accounts, for signs of compromise and enforce strict identity and access management (IAM) policies. Implementing Conditional Access policies that evaluate login risk based on location, device, and behavior can help mitigate AiTM attacks. Regarding the HR threat, security teams should conduct simulated phishing tests tailored to HR scenarios and ensure robust data loss prevention (DLP) rules are in place to monitor for the unauthorized transmission of sensitive employee data. Ultimately, these weekly reviews of significant threats are not just news items but actionable intelligence, providing a roadmap for security teams to proactively harden their defenses against the evolving tactics of modern cyber adversaries.

Telegram X LinkedIn
Back to News