Menu

Microsoft Issues Warning on Large Scale Phishing-as-a-Service Operation

The News: The Microsoft 365 Defender Threat Intelligence Team issued a warning this week on a large-scale phishing-as-a-service operation discovered as they were researching phishing attacks. The Microsoft 365 Defender Intelligence team found that the BulletProofLink operation is responsible for many of the phishing attacks that hit enterprises today, using a large number of newly-created subdomains. Read the full announcement from Microsoft.

Microsoft Issues Warning on Large Scale Phishing-as-a-Service Operation

Analyst Take: Microsoft’s warning about a large-scale phishing-as-a-service operation is actually pretty exciting. It means security teams and the technology and tactics they are using, the research they do, and the rabbit holes it leads them down — well, it works.

In this instance, Microsoft’s 365 Defender Intelligence team discovered BulletProofLink (also known as BulletProfitLink and/orAnthrax), a service designed to make phishing even easier for threat actors, and conveniently being advertised in underground cybercrime forums. BulletProofLink sells phishing kits, email templates, hosting, and automated services and makes it super easy for hackers to launch and manage every aspect of phishing campaigns.

Microsoft researchers also found that the BulletProofLink scam offered login pages to popular apps and websites including Microsoft OneDrive, LinkedIn, Adobe, AT&T, Dropbox and Google Docs. Someone with a small budget could easily deploy a fake email and gain access to business and personal information that could be sold on the dark web.

As I mentioned, I think this discovery of such a large-scale phishing-as-a-service operation is a big victory for the cybersecurity community and the sharing of this find by Microsoft benefits everyone. Microsoft’s Defender Threat Intelligence team’s research on the BulletProofLink operation will allow them (and others) to learn more about phishing-as-a-service and to expose how easy it is for threat actors to purchase campaigns and deploy them. With this new information, organizations can build on the findings to enhance email filtering rules and threat detection technologies — things that constantly need improvement for ensure protection.

Phishing-as-a-Service is a New Frontier

Email-based threats are constantly evolving as cyber criminals get more sophisticated with the tools that they use. In the past, threat actors would have to build individual emails and websites, but these small one-off approaches have all but disappeared as a new service-based cybercrime economy has emerged.

Phish kits are a one-time purchase that come with ready-to-use templates for emails and websites. Attackers can site up websites and evade detection easily with these options. While phishing kits are nothing new, phishing-as-a-service makes it even easier for criminals to facilitate attacks on unsuspecting businesses. Hackers make these services available for purchase on a weekly, bi-weekly, monthly, or annual subscription.

Protecting Against Phishing Attacks

Today, falling victim to a cyberattack is generally not a matter of if it will happen, but more a matter of when it will happen. Phishing campaigns are incredibly popular, and with good reason — they are low hanging fruit. Tricking unsuspecting employees, or any recipient of an email, into providing information that ultimately allows threat actors to gain access to the organization is relatively easy. That’s why it’s important to add layers of protection against phishing schemes, including enabling mailbox intelligence settings, developing phishing awareness training campaigns, regularly testing the organization along the way, and doing research like what the team at Microsoft did, which are all key to better protecting the organization.

On the cybersecurity front as a whole, it’s good to see positive news. Not that phishing attacks made easy by these offerings haven’t already been perpetrated or are in motion are a good thing, but knowing that phishing-as-a-service offerings exist and are out in the wild in full force will hopefully inspire cybersecurity pros within organizations to redouble their efforts at education and awareness, testing, and taking steps to fine-tune their security operations strategy even more. Microsoft sharing the deets about this discovery with the community as a whole benefits everyone.

Disclosure: Futurum Research is a research and advisory firm that engages or has engaged in research, analysis, and advisory services with many technology companies, including those mentioned in this article. The author does not hold any equity positions with any company mentioned in this article.

Additional insights from Futurum Research:

AT&T Phone-Unlocking Malware Scheme Costs Company $200 Million and Shines Light on Potential Threats

Biden Administration Appeals to Big Tech to Raise the Bar on Cybersecurity

The New Normal: Hybrid Work Means Greater Focus on Endpoint Security

Image Credit: Daily Express

Author Information

Shelly Kramer is a serial entrepreneur with a technology-centric focus. She has worked alongside some of the world’s largest brands to embrace disruption and spur innovation, understand and address the realities of the connected customer, and help navigate the process of digital transformation.

Related Insights
OpenAI Frontier Close the Enterprise AI Opportunity Gap—or Widen It
February 9, 2026

OpenAI Frontier: Close the Enterprise AI Opportunity Gap—or Widen It?

Futurum Research Analysts Mitch Ashley, Keith Kirkpatrick, Fernando Montenegro, Nick Patience, and Brad Shimmin examine OpenAI Frontier and whether enterprise AI agents can finally move from pilots to production. The...
Commvault Introduces Geo Shield. Can One Platform Meet Sovereign Needs?
February 9, 2026

Commvault Introduces Geo Shield. Can One Platform Meet Sovereign Needs?

Fernando Montenegro, VP & Practice Lead for Cybersecurity & Resilience at Futurum, examines Commvault Geo Shield and its focus on sovereign deployment models that retain control over data location, operations,...
Is 2026 the Turning Point for Industrial-Scale Agentic AI?
February 5, 2026

Is 2026 the Turning Point for Industrial-Scale Agentic AI?

VP and Practice Lead Fernando Montenegro shares insights from the Cisco AI Summit 2026, where leaders from the major AI ecosystem providers gathered to discuss bridging the AI ROI gap...
Cisco’s "End of Gold": A High-Stakes Pivot to Skills-First Architecture
February 3, 2026

Cisco’s “End of Gold”: A High-Stakes Pivot to Skills-First Architecture

Tiffani Bova, Chief Strategy and Research Officer at The Futurum Group, examines Cisco’s 360 Partner Program and how its redesigned incentives, designations, and tools aim to align partner profitability with...
ServiceNow Q4 FY 2025 Earnings Highlight AI Platform Momentum
January 30, 2026

ServiceNow Q4 FY 2025 Earnings Highlight AI Platform Momentum

Futurum Research analyzes ServiceNow’s Q4 FY 2025 results, highlighting AI agent monetization, platform consolidation in CRM/CPQ, and a security stack aimed at scaling agentic AI across governed workflows heading into...
Microsoft Q2 FY 2026 Cloud Surpasses $50B; Azure Up 38% CC
January 30, 2026

Microsoft Q2 FY 2026: Cloud Surpasses $50B; Azure Up 38% CC

Futurum Research analyzes Microsoft’s Q2 FY 2026 earnings, highlighting AI-led cloud demand, agent platform traction, and Copilot adoption amid record capex and a substantially expanded commercial backlog....

Book a Demo

Newsletter Sign-up Form

Get important insights straight to your inbox, receive first looks at eBooks, exclusive event invitations, custom content, and more. We promise not to spam you or sell your name to anyone. You can always unsubscribe at any time.

All fields are required






Thank you, we received your request, a member of our team will be in contact with you.