Phishing Campaign Targets Microsoft 365 Users with Fake Login Pages

26 November 2025 Technology

NEW YORK — A large-scale phishing operation is targeting Microsoft 365 users worldwide by deploying fake login pages designed to steal usernames and passwords, according to security researchers. The campaign, driven by a phishing platform known as Quantum Route Redirect (QRR), uses nearly 1,000 domains to host realistic-looking Microsoft 365 login pages that evade some automated detection systems.

QRR’s phishing emails mimic legitimate communications such as DocuSign requests, payment notifications, voicemail alerts, and QR-code prompts. These messages direct recipients to counterfeit Microsoft 365 login portals, often hosted on parked or compromised legitimate websites, which lends an appearance of authenticity to unsuspecting users.

Researchers have tracked QRR activity in 90 countries, with approximately 76% of attacks targeting users in the United States. This widespread reach makes QRR one of the largest active phishing operations currently observed.

The platform incorporates advanced features including automated bot filtering, which directs automated scanners to benign pages while routing real users to the credential-harvesting sites. Attackers manage their campaigns through a control panel that logs traffic and activity, enabling rapid scaling without requiring extensive technical expertise.

QRR emerged shortly after Microsoft disrupted a previous phishing network called RaccoonO365, which had been responsible for stealing thousands of Microsoft credentials, including those linked to over 20 U.S. healthcare organizations. Microsoft’s Digital Crimes Unit shut down hundreds of related websites and identified an individual allegedly operating the network.

Other recent phishing kits targeting Microsoft credentials include VoidProxy, Darcula, Morphing Meerkat, and Tycoon2FA. QRR builds on these tools by adding automation and enhanced management capabilities.

Security analysts warn that the use of compromised or parked legitimate domains and the realistic appearance of the phishing pages make QRR particularly effective. Users are advised to exercise caution when clicking links in unsolicited emails and to verify the authenticity of login pages before entering credentials.

BREAKING NEWS
Never miss a breaking news alert!
Written By
Maya Chen reports on international politics, conflict and diplomacy. She specializes in explaining how global events shape U.S. security, trade and migration, and how decisions made abroad ripple into life at home.
View Full Bio & Articles →

Leave a Reply