LIVE NEWS
  • How NIST’s Cutback of CVE Handling Impacts Cyber Teams
  • Bybit Launches Learn & Trade Growth Hub to Guide Users From Education to Trading With Rewards By Chainwire
  • Middle East crisis live: Iran says handing over enriched uranium a ‘non-starter’ as strait of Hormuz remains shut | US-Israel war on Iran
  • Breaks below key SMAs, eyes on 0.7800
  • Stop managing NATO. Start rebalancing it.
  • 'It would break my heart' – wind farm plans leave people divided
  • Pope Leo tells Angola during huge Mass to ‘build hope’ | Religion News
  • One person holds the keys to $200 million of a project’s crypto. His co-founder says that has to end
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • See More
    • Artificial Intelligence
    • Climate Risks
    • Defense
    • Healthcare Innovation
    • Science
    • Technology
    • World
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • Artificial Intelligence
  • Climate Risks
  • Defense
  • Healthcare Innovation
  • Science
  • Technology
  • World
Home»Cybersecurity»An AI-powered phishing campaign has compromised hundreds of organizations
Cybersecurity

An AI-powered phishing campaign has compromised hundreds of organizations

primereportsBy primereportsMarch 23, 2026No Comments5 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
An AI-powered phishing campaign has compromised hundreds of organizations
Share
Facebook Twitter LinkedIn Pinterest Email


A phishing campaign tied to AI cloud-hosting service Railway has given hackers access to the Microsoft cloud accounts for hundreds of businesses, according to researchers at Huntress.

Rich Mozeleski, product manager for Huntress’ identity team, told CyberScoop the campaign is currently tied to a smaller actor and approximately a dozen IP addresses, but has managed to compromise hundreds of targets in the past few weeks.

In early March it was compromising a few dozen targets a day, but starting March 3, there was a “massive increase” in that tempo. Mozeleski said that in addition to being more sophisticated than usual, there were no identical emails or domains used, leading researchers to suspect that they may have been generated through artificial intelligence tools. The templates ranged from traditional email lures to QR codes and co-opted file-share sites.

“Just the amount of it was like Pandora’s Box had opened, and the efficacy was just through the roof,” Mozeleski said.

An AI-powered phishing campaign has compromised hundreds of organizations

A custom file download phishing lure used in the campaign. Researchers believe the attackers used AI to generate unique lures at scale. (Source: Huntress)

The phishing campaign exploits Microsoft’s authentication flow for devices such as smart TVs, printers and terminals, which gives the attacker valid OAuth tokens for that account for up to 90 days without needing a password or multifactor authentication.

Ultimately, Huntress has seen hundreds of its customers fall for the phishing scams, though they claim to have prevented post-compromise activity in all cases. But they also believe their customers represent only a small fraction of the likely total victim set, which could number in the thousands.

The affected entities span a range of sectors: construction and trade companies, law firms, nonprofits, real estate, manufacturing, finance and insurance, healthcare, government and public safety organizations were all among the 344 victims detailed in the Huntress blog.

To protect customers, Mozeleski said Huntress issued a conditional access policy update Wednesday to 60,000 Microsoft cloud tenants on emails coming from Railway domains, an act he described as “not anything we’ve ever done before.”

Weaponizing vibe-coded infrastructure

Researchers believe the attackers were weaponizing Railway’s Platform as a Service — built to help non-coders build websites and tools — to spin up credential harvesting infrastructure for the campaign.

By using compromised domains and pumping out bespoke lures, the phishing emails avoid most commercial email filtering solutions. It’s not clear if they used Railway’s AI tool or a separate one to generate the lures. Either way, all the attacks Huntress has observed are coming through Railway.com IP infrastructure.

In response to questions from CyberScoop on Friday, Railway solutions engineer Angelo Saraceno said the company is aware of the incident and was first contacted by Huntress on March 6 regarding phishing traffic originating from a specific IP address and three domains. “The associated accounts were banned and the domains were blocked,” Saraceno said.

“Our heuristics are built to catch correlations: repeated credit cards, shared code sources, overlapping infrastructure,” he wrote in an email. “When a campaign avoids those signals, it gets further than we’d like.”

Saraceno called Railway’s fraud detection “a balance” between catching bad actors and getting flooded with false positives, pointing to an incident in February when fine-tuning in the company’s automated abuse enforcement system led to a customer outage.

Earlier Friday, Mozeleski told CyberScoop that Huntress continued to see more than 50 compromises a day tied to Railway phishing domains. When asked what more Railway could have done to prevent abuse of their platform, he said vetting and validation on the free use of their product could be improved. He pointed to products with similar trials, like MailChimp and HubSpot, that have controls and oversight in place so users can’t “go pump in a million contacts and start spamming.”

“Do not allow anybody to come in, start a trial, spin up resources, and start using your infrastructure” for cyberattacks, he said.

One of the more striking contrasts of the campaign was the use of AI to create phishing infrastructure akin to a state-sponsored threat actor or advanced cybercriminal group in service of a garden-variety phishing scam.

It bolsters warnings coming from cybersecurity experts that low-level cybercriminals — often called “script kiddies” for their reliance on automated hacking tools — are poised to become one of the biggest beneficiaries of the generative AI era. Last month, John Hultquist, chief analyst at Google’s Threat Intelligence Group, said that he expects that AI tools will help “smaller cybercriminal outfits more than state-sponsored hackers.”

Testimonials on Railway’s website tout the service’s ability to deliver “vertical auto-scale out of the box”, while another said it “makes spinning up self-hosted third-party tools almost effortless.”

It may also give them a leg up on victim organizations that have more restrictive internal policies around the use of AI for cyber defense.

“We are seeing crooks as the first movers of AI,” said Prakash Ramamurthy, chief product officer at Huntress. “They don’t have any qualms about PII, they don’t have any qualms about model training … and this incident, just in the sheer pace at which it has evolved, is kind of a testament to that.”

Derek B. Johnson

Written by Derek B. Johnson

Derek B. Johnson is a reporter at CyberScoop, where his beat includes cybersecurity, elections and the federal government. Prior to that, he has provided award-winning coverage of cybersecurity news across the public and private sectors for various publications since 2017. Derek has a bachelor’s degree in print journalism from Hofstra University in New York and a master’s degree in public policy from George Mason University in Virginia.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleSupreme Court declines to review press freedom case : NPR
Next Article Empery Digital sells 63 BTC for $4.6M as it leans harder into buybacks
primereports
  • Website

Related Posts

Cybersecurity

How NIST’s Cutback of CVE Handling Impacts Cyber Teams

April 19, 2026
Cybersecurity

[Webinar] Eliminate Ghost Identities Before They Expose Your Enterprise Data

April 18, 2026
Cybersecurity

Tycoon 2FA Loses Phishing Kit Crown Amid Surge in Attacks

April 18, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Global Resources Outlook 2024 | UNEP

December 6, 20258 Views

The D Brief: DHS shutdown likely; US troops leave al-Tanf; CNO’s plea to industry; Crowded robot-boat market; And a bit more.

February 14, 20264 Views

German Chancellor Merz faces difficult mission to Israel – DW – 12/06/2025

December 6, 20254 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Latest Reviews

Subscribe to Updates

Get the latest tech news from FooBar about tech, design and biz.

PrimeReports.org
Independent global news, analysis & insights.

PrimeReports.org brings you in-depth coverage of geopolitics, markets, technology and risk – with context that helps you understand what really matters.

Editorially independent · Opinions are those of the authors and not investment advice.
Facebook X (Twitter) LinkedIn YouTube
Key Sections
  • World
  • Geopolitics
  • Popular Now
  • Artificial Intelligence
  • Cybersecurity
  • Crypto
All Categories
  • Artificial Intelligence
  • Climate Risks
  • Crypto
  • Cybersecurity
  • Defense
  • Economy
  • Geopolitics
  • Global Markets
  • Healthcare Innovation
  • Politics
  • Popular Now
  • Science
  • Technology
  • World
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
  • Disclaimer
  • Cookie Policy
  • DMCA / Copyright Notice
  • Editorial Policy

Sign up for Prime Reports Briefing – essential stories and analysis in your inbox.

By subscribing you agree to our Privacy Policy. You can opt out anytime.
Latest Stories
  • How NIST’s Cutback of CVE Handling Impacts Cyber Teams
  • Bybit Launches Learn & Trade Growth Hub to Guide Users From Education to Trading With Rewards By Chainwire
  • Middle East crisis live: Iran says handing over enriched uranium a ‘non-starter’ as strait of Hormuz remains shut | US-Israel war on Iran
© 2026 PrimeReports.org. All rights reserved.
Privacy Terms Contact

Type above and press Enter to search. Press Esc to cancel.