Skip to the main content.

3 min read

Phishing Modernization: New attacker tricks and how to stop them

Phishing Modernization: New attacker tricks and how to stop them
Phishing Modernization: New attacker tricks and how to stop them
6:29

Phishing is not just fake invoices and misspelled emails anymore. Today attackers rent turnkey kits, steal session tokens to skip MFA, trick users with OAuth consent prompts, and hide lures in QR codes. The good news: you can blunt most of this with modern controls and a simple playbook that protects revenue, reputation, and operations.

What changed recently

The modern phishing toolkit

Adversary in the middle

AiTM kits sit between the user and the real site. They forward the login to the legitimate service, then capture the session token. Result: the attacker can act as the user without triggering MFA. Overview: https://en.wikipedia.org/wiki/Man-in-the-middle_attack

OAuth consent traps

Instead of stealing a password, the attacker asks for permission. A convincing consent screen requests scopes like read mail or send mail as you. If a user accepts, the attacker gets long lived cloud access. Guidance: https://learn.microsoft.com/en-us/entra/identity/enterprise-apps/protect-against-consent-phishing

QR code lures

Quishing uses QR images in email or in the physical world that send users to fake logins or malware sites. Incidents are rising. News example: https://www.theguardian.com/money/2025/may/25/qr-code-scam-what-is-quishing-drivers-app-phone-parking-payment

Defenses that actually work

Strong authentication that resists phishing

Adopt passkeys for workforce accounts. Where passkeys are not yet possible, require phishing resistant MFA and number matching. Background: https://en.wikipedia.org/wiki/Passwordless_authentication

Protect the session after login

Turn on device bound session credentials where available. Binding tokens to a device makes stolen cookies useless on an attacker’s machine. Articles and docs: https://www.theverge.com/2025/7/29/24107228/google-chrome-device-bound-session-credentials and https://developer.chrome.com/docs/web-platform/device-bound-session-credentials

Govern cloud app consent

Restrict end user consent to verified publishers or admin approved apps. Review high risk scopes and monitor new grants. Remove stale apps. How-to: https://techcommunity.microsoft.com/blog/microsoft-entra-blog/oauth-consent-phishing-explained-and-prevented/4423357

Email authentication with enforcement

SPF and DKIM are table stakes. Add DMARC with reporting, then move policy from none to quarantine to reject. Measure look alike domain attempts and adjust. Primer: https://en.wikipedia.org/wiki/DMARC and trends: https://apwg.org/trendsreports

Train for what attackers actually use

Go beyond generic link lures. Include AiTM and QR scenarios in quarterly simulations. Coach on consent prompts, token theft, and out of band verification. Materials: https://www.cisa.gov/secure-our-world/teach-employees-avoid-phishing

A practical 30 day hardening plan

  • Week 1: enable passkeys for admins and high risk roles. Require phishing resistant MFA for all users.

  • Week 2: enforce DMARC with RUA and RUF reporting. Tighten SPF includes. Fix misaligned senders across marketing, ticketing, and payroll tools.

  • Week 3: restrict OAuth consent to verified publishers. Review existing enterprise app grants. Remove stale high scope apps.

  • Week 4: pilot device bound session credentials in your primary browser. Update your incident response playbook for token theft.

What success looks like

How GAM Tech can help

  • Phishing Readiness Assessment: mailbox signals plus targeted simulations that reflect current attacker tactics.

  • DMARC setup and monitoring: policy tuning, reporting, and sender alignment across every service that sends on your domain.

  • Microsoft 365 hardening: passkey rollout guidance, conditional access, consent governance, mailbox and SharePoint protections.

  • SOC monitoring and incident response: detection, containment, and post incident token hygiene.

FAQ

Does MFA still help if attackers use AiTM

Yes, but it is not sufficient by itself. Combine MFA with passkeys or device bound tokens so stolen cookies are useless. Reference: https://csrc.nist.gov/glossary/term/session_hijack_attack

Are QR codes always risky

No. Treat them like any link. Verify the destination, prefer trusted apps for payments, and avoid scanning codes on stickers or posters you do not control. Reference: https://www.theguardian.com/money/2025/may/25/qr-code-scam-what-is-quishing-drivers-app-phone-parking-payment