Menu

Microsoft Issues Warning on Large Scale Phishing-as-a-Service Operation

The News: The Microsoft 365 Defender Threat Intelligence Team issued a warning this week on a large-scale phishing-as-a-service operation discovered as they were researching phishing attacks. The Microsoft 365 Defender Intelligence team found that the BulletProofLink operation is responsible for many of the phishing attacks that hit enterprises today, using a large number of newly-created subdomains. Read the full announcement from Microsoft.

Microsoft Issues Warning on Large Scale Phishing-as-a-Service Operation

Analyst Take: Microsoft’s warning about a large-scale phishing-as-a-service operation is actually pretty exciting. It means security teams and the technology and tactics they are using, the research they do, and the rabbit holes it leads them down — well, it works.

In this instance, Microsoft’s 365 Defender Intelligence team discovered BulletProofLink (also known as BulletProfitLink and/orAnthrax), a service designed to make phishing even easier for threat actors, and conveniently being advertised in underground cybercrime forums. BulletProofLink sells phishing kits, email templates, hosting, and automated services and makes it super easy for hackers to launch and manage every aspect of phishing campaigns.

Microsoft researchers also found that the BulletProofLink scam offered login pages to popular apps and websites including Microsoft OneDrive, LinkedIn, Adobe, AT&T, Dropbox and Google Docs. Someone with a small budget could easily deploy a fake email and gain access to business and personal information that could be sold on the dark web.

As I mentioned, I think this discovery of such a large-scale phishing-as-a-service operation is a big victory for the cybersecurity community and the sharing of this find by Microsoft benefits everyone. Microsoft’s Defender Threat Intelligence team’s research on the BulletProofLink operation will allow them (and others) to learn more about phishing-as-a-service and to expose how easy it is for threat actors to purchase campaigns and deploy them. With this new information, organizations can build on the findings to enhance email filtering rules and threat detection technologies — things that constantly need improvement for ensure protection.

Phishing-as-a-Service is a New Frontier

Email-based threats are constantly evolving as cyber criminals get more sophisticated with the tools that they use. In the past, threat actors would have to build individual emails and websites, but these small one-off approaches have all but disappeared as a new service-based cybercrime economy has emerged.

Phish kits are a one-time purchase that come with ready-to-use templates for emails and websites. Attackers can site up websites and evade detection easily with these options. While phishing kits are nothing new, phishing-as-a-service makes it even easier for criminals to facilitate attacks on unsuspecting businesses. Hackers make these services available for purchase on a weekly, bi-weekly, monthly, or annual subscription.

Protecting Against Phishing Attacks

Today, falling victim to a cyberattack is generally not a matter of if it will happen, but more a matter of when it will happen. Phishing campaigns are incredibly popular, and with good reason — they are low hanging fruit. Tricking unsuspecting employees, or any recipient of an email, into providing information that ultimately allows threat actors to gain access to the organization is relatively easy. That’s why it’s important to add layers of protection against phishing schemes, including enabling mailbox intelligence settings, developing phishing awareness training campaigns, regularly testing the organization along the way, and doing research like what the team at Microsoft did, which are all key to better protecting the organization.

On the cybersecurity front as a whole, it’s good to see positive news. Not that phishing attacks made easy by these offerings haven’t already been perpetrated or are in motion are a good thing, but knowing that phishing-as-a-service offerings exist and are out in the wild in full force will hopefully inspire cybersecurity pros within organizations to redouble their efforts at education and awareness, testing, and taking steps to fine-tune their security operations strategy even more. Microsoft sharing the deets about this discovery with the community as a whole benefits everyone.

Disclosure: Futurum Research is a research and advisory firm that engages or has engaged in research, analysis, and advisory services with many technology companies, including those mentioned in this article. The author does not hold any equity positions with any company mentioned in this article.

Additional insights from Futurum Research:

AT&T Phone-Unlocking Malware Scheme Costs Company $200 Million and Shines Light on Potential Threats

Biden Administration Appeals to Big Tech to Raise the Bar on Cybersecurity

The New Normal: Hybrid Work Means Greater Focus on Endpoint Security

Image Credit: Daily Express

Author Information

Shelly Kramer is a serial entrepreneur with a technology-centric focus. She has worked alongside some of the world’s largest brands to embrace disruption and spur innovation, understand and address the realities of the connected customer, and help navigate the process of digital transformation.

Related Insights
How Fast Can Arctic Wolf Turn Sevco's Visibility Into an Advantage
March 2, 2026

How Fast Can Arctic Wolf Turn Sevco’s Visibility Into an Advantage?

Fernando Montenegro, VP at Futurum, analyzes Arctic Wolf's acquisition of Sevco Security and the challenge of integrating exposure management into an MDR platform....
NetApp Q3 FY 2026 Results Highlight All-Flash Growth And Cloud Services
March 2, 2026

NetApp Q3 FY 2026 Results Highlight All-Flash Growth And Cloud Services

Futurum Research analyzes NetApp’s Q3 FY 2026 earnings, focusing on all-flash growth, hyperscaler-native storage services, and AI data readiness initiatives....
IonQ Q4 FY 2025 Results Highlight Commercial Expansion And Platform Breadth
February 27, 2026

IonQ Q4 FY 2025 Results Highlight Commercial Expansion And Platform Breadth

Futurum Research reviews IonQ’s Q4 FY 2025 earnings, focusing on commercial expansion signals, platform positioning across quantum domains, and implications for enterprise adoption paths....
The Storage Era is Dead; Long Live Everpure!
February 25, 2026

Storage Evolved: Everpure Takes on Data Challenges for an AI World

Brad Shimmin, VP and Practice Lead at Futurum, shares his insights on Pure Storage’s rebrand to Everpure as well as its supportive acquisition of 1touch.io, exploring why dropping "Storage" is...
Palo Alto Networks Q2 FY 2026 ARR Accelerates as Platform Strategy Scales
February 23, 2026

Palo Alto Networks Q2 FY 2026: ARR Accelerates as Platform Strategy Scales

Fernando Montenegro, VP & Practice Lead for Cybersecurity & Resilience at Futurum, analyzes Palo Alto Networks’ Q2 FY 2026 results, highlighting platformization momentum, SASE and AI SOC traction, and identity/observability...
No More Playing Koi Can Palo Alto Networks Secure the Modern Supply Chain
February 18, 2026

No More Playing Koi: Can Palo Alto Networks Secure the Modern Supply Chain?

Fernando Montenegro, VP at Futurum, analyzes Palo Alto Networks' acquisition of Koi Security, a move that shifts endpoint defense from file scanning to marketplace governance....

Book a Demo

Newsletter Sign-up Form

Get important insights straight to your inbox, receive first looks at eBooks, exclusive event invitations, custom content, and more. We promise not to spam you or sell your name to anyone. You can always unsubscribe at any time.

All fields are required






Thank you, we received your request, a member of our team will be in contact with you.