Analysis of Dadsec OTT, a new prevalent PhaaS using AiTM phishing 📧

Sekoia.io analysts conducted an in-depth analysis of the emerging Dadsec Attack-in-The-Middle (AiTM) Phishing-as-a-Service (PhaaS). The Dadsec OTT platform quickly became widespread and used in numerous phishing campaigns, including the trendy and evasive QR code phishing attacks. Dadsec OTT phishing pages mainly aim to harvest Microsoft 365 session cookies to bypass the MFA process during subsequent authentication. We published results of our analysis in the FLINT [FLINT 2023-043 - Dadsec OTT: a new prevalent PhaaS using AitM phishing](https://app.sekoia.io/intelligence/objects/report--2f39b32d-42e8-4453-9ca7-9cd1954991e4) aiming at presenting the context about the threat, how the Dadsec phishing kit works, as well as tracking and detection opportunities related to this threat. Related resources: * [FLINT 2023-043 - Dadsec OTT: a new prevalent PhaaS using AitM phishing](https://app.sekoia.io/intelligence/objects/report--2f39b32d-42e8-4453-9ca7-9cd1954991e4) * [Dadsec malware page](https://app.sekoia.io/intelligence/objects/malware--86d9f8a4-5be2-4cd9-b419-0c7a0abde74d)