This devious two-step phishing campaign uses Microsoft tools to bypass email security


  • Two-step phishing bypasses security with user-activated actions
  • Fake Microsoft portals quickly collect sensitive credentials
  • Advanced threat detection is key to combating phishing

A two-step phishing attack uses Microsoft Visio files (.vsdx) and SharePoint, marking a new chapter in cyber deception, experts warn.

The security researchers at Perception Point reported a dramatic increase in the number of attacks using .vsdx files.