Phishing triage analysis of a real Sneaky2FA AiTM campaign targeting Microsoft 365. Documents the full attack chain, IOC extraction, evasion techniques, and sandbox vs reputation tool detection gap.
ioc incident-response phishing virustotal homelab threat-analysis blue-team mitre-attack windows-security aitm phishing-analysis sneaky2fa
-
Updated
May 8, 2026