Threat Actors Leverage File-Sharing Service and Reverse Proxies for Credential HarvestingWe analyzed a phishing campaign involving malicious emails containing a link to a file-sharing solution, which further leads to a PDF document with a secondary link designed to steal login info and session cookies.
Source:
Threat Actors Leverage File-Sharing Service and Reverse Proxies for Credential Harvesting