Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportBlogContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR: Identity Threat Detection and Response

    Protect your Microsoft 365 and Google Workspace identities and email environments.

    Managed ITDR: Identity Threat Detection and Response

    Protect your Microsoft 365 and Google Workspace identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training Software

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training Software

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    dMSA Ouroboros: Self-Sustaining Credential Extraction in Windows Server 2025
    Huntress Cybersecurity
    dMSA Ouroboros: Self-Sustaining Credential Extraction in Windows Server 2025
    Huntress Cybersecurity
    Social Engineering Leveled Up. Has Your Security Program?
    Huntress Cybersecurity
    Social Engineering Leveled Up. Has Your Security Program?
    Huntress Cybersecurity
    ClickFix Removes Your Background but Leaves the Malware
    Huntress Cybersecurity
    ClickFix Removes Your Background but Leaves the Malware
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Blog
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportBlogContact
Search
Close search
Get a Demo
Start for Free
HomeBlog
Social Engineering Leveled Up. Has Your Security Program?
Published:
May 1, 2026

Social Engineering Leveled Up. Has Your Security Program?

By:
Beth Robinson
Share icon
Glitch effectGlitch effectGlitch effect

Key Takeaways

1. Trust is the new attack surface. Attackers aren't breaking through security controls: they're operating inside them. Deepfakes, poisoned AI platforms, and hijacked Microsoft authentication flows have turned identity, everyday workflows, and the tools teams rely on into the lure itself.

2. Legitimate infrastructure is the new cover. The Railway/EvilTokens campaign used a real cloud platform, real Microsoft auth flows, and AI-generated lures to hit 340+ organizations with no two identical phishing lures. You can't block it by domain or lure type. The attack is only visible at the identity and behavior layer.

3. Resilience beats prevention, but only with the right operating model. The teams adapting fastest aren't adding more tools. They're cutting alert noise, assigning clear ownership before something goes wrong, and measuring speed from detection to action. Prevention was built for a world where attacks looked wrong. That world is shrinking fast.

We’ve spent years treating prevention as the endgame: block the attack, and the problem disappears. But that model is starting to break.

The environment it was built for no longer exists. Attackers aren’t just finding ways around security controls. They’re running social engineering scams inside them, using the same tools, workflows, and signals against us that we’re supposed to trust.

And while attackers have adapted quickly, many security programs haven't kept pace. It's showing up in the data. In a recent report, only 8.9% of teams named phishing and social engineering as their biggest preparedness gap, which means most feel covered. That confidence is the gap. The threat has expanded well beyond what most security programs were built to see into identity abuse, trusted platforms, and the everyday workflows teams already trust.

Most teams also reported having adequate budgets and mature tooling. So why do positive outcomes still lag while confidence slips?

Teams aren’t behind because they don’t care or don’t work hard. They’re behind because attackers are targeting trust on an unprecedented scale and scope. It’s hitting every aspect of your digital world: identities, AI platforms, developer platforms, business software, and the workflows that keep organizations running. They’re operating in a way that makes social engineering compromise inevitable, not preventable.

Resilient teams are recognizing this shift and taking steps toward a security model built for today’s threat landscape.


Trust in identities: When "real" isn't real anymore

The definition of a "trusted identity" is getting harder to pin down.

Deepfakes push attacks well beyond email. Attackers are using AI to impersonate executives, IT staff, and even job candidates. They build rapport over time with cloned voices, then add video to lend credibility to requests that would otherwise raise red flags. 

That doesn't mean every organization is suddenly facing Hollywood-grade live deepfake calls every day. But it does mean the old assumption that seeing or hearing someone adds assurance is no longer reliable. This Tradecraft Tuesday episode, AI: Friend or Foe in Cybersecurity, made that point directly: identity itself isn't a trustworthy signal anymore.

That aligns with what the surveyed teams are experiencing. Identity-based attacks are the area organizations feel least prepared to defend against (26.5%), and 32% lack Identity Threat Detection and Response (ITDR) to protect this increasingly vulnerable attack surface.

Resilient teams are building security programs that stretch beyond user authentication to the behavioral signals that appear at the earliest stages of identity compromise before a crisis emerges. 

Identity used to be the perimeter. Now it's the lure.


Trust in information sources: When answers become the attack

Attackers aren't just impersonating people. They're manipulating the information we use to make decisions and the workflows we trust to deliver it.

Search engines and AI platforms have become our go-to starting point for problem-solving. Search, scan the top result, follow the instructions, move on. Problem solved! It's fast and reliable. And it's exactly the pattern attackers are designing around.

In one case that hit close to home, a Huntress engineer searched for a Claude installer, clicked the top result, and downloaded malware. Real search engine. Real-looking result. Normal workflow. No obvious red flags, and that's the point. 

In another case, macOS users searching for routine fixes were directed to ChatGPT or Grok pages that looked exactly like legitimate support content. The moment they followed the instructions, they executed malicious commands that installed the AMOS infostealer malware.

Figure 1: Malicious macOS “routine fix” instructions that make the attack look like normal troubleshooting.


The failure isn't carelessness. It's that nothing about these interactions looks wrong until it's too late. Users followed a normal workflow. Attackers designed the attack to fit inside it.

That creates a second problem for security teams. By the time something surfaces as actionable, the attacker is already in. Nearly two-thirds of teams surveyed report that at least 25% of their alerts are noise. While security teams are sifting through that queue, attackers have already reduced the steps and time required to establish access. The gap between when compromise happens and when a team can respond keeps widening. Teams are paying attention. Attackers have just made it a lot harder to find anything worth acting on.

Eric Stride, Chief Security Officer at Huntress, says: 

"Most teams think resilience comes from seeing more. In reality, it comes from knowing what matters and acting quickly when it does."

Resilient teams treat that as an operational mandate, not a principle. They cut the alert queue, assign clear ownership, and measure speed from detection to action. Because faster clarity on what's real beats broader coverage of what might be.

But manipulating what people see is only part of the picture. Attackers are also manipulating the infrastructure that those signals travel through.


Trust in third parties: Phishing infrastructure hiding in plain sight

Attackers don't just abuse people. They abuse the platforms we trust at scale.

The Railway campaign is the clearest recent example. A productized phishing-as-a-service operation (PHaaS) called EvilTokens weaponized Railway, a legitimate cloud deployment platform, to stand up credential-harvesting infrastructure on demand. More than 340 organizations across the US, Canada, Australia, New Zealand, and Germany were hit. The attack chain ran through legitimate Railway-hosted infrastructure, Cloudflare Workers pages, compromised websites, and trusted URL redirectors at machine speed.

This wasn't a credential-stealing phishing page. EvilTokens exploited a legitimate Microsoft OAuth authentication flow (device code phishing) to trick victims into handing over persistent session tokens. The victim received a real Microsoft URL, completed what looked like a normal security prompt, and authenticated the attacker's session without knowing it. No password stolen. MFA bypassed completely. The token granted access to email, Teams, SharePoint, and OneDrive and stayed valid even after a password reset.


Figure 2: Example of device code phishing in the Railway campaign


Every piece of the attack looks legitimate until it isn't.

What’s worse is that defenders can't easily block this campaign by domain or lure type because the legitimate infrastructure is often needed for business operations, and it shifts fast. Instead, you have to be prepared to block it at the identity and behavior layer, where the abuse is still visible even when everything else looks clean. That's the bigger shift: trusted third-party services now give attackers cover, speed, and scale at the same time. 

Moving beyond that requires building a system your team trusts when something goes wrong: one that surfaces the right signals, makes ownership clear, tracks identity behavior beyond authentication, and uses automation to reduce noise so teams can limit impact and recover quickly. Stride puts it this way:

"The goal isn't to eliminate every risk. It's to build a system your team trusts when something goes wrong."

And if trusted infrastructure gives attackers cover, trusted routine gives them time.


Trust in everyday workflows: When normal behavior is the target

Attackers know exactly what you rely on to keep your day running smoothly. Calendar invites, automated emails, shared design tools, SaaS integrations. You're moving through all of it, all day long.

They know you trust a calendar invite from HR, a routine notification, or a link embedded in a familiar workflow. These attacks slip through because they follow the rules of your environment. They don't trigger obvious controls. They don't look out of place. They look like work. This exact pattern was called out in the Sublime Security, Trends to watch in 2026: Calendar phishing and opportunistic service abuse, featuring John Hammond, Senior Principal Security Researcher at Huntress. 

And when alerts pile up, and ownership is unclear, response times slow to a crawl, giving attackers the one thing they really need: time. Anna Pham, Senior Tactical Response Analyst at Huntress, says:

"When alerts pile up, response slows. And when response slows, even small mistakes turn into major incidents."

Resilient teams are designed for this reality. They prioritize clear ownership, reduce cognitive load, and make sure that when something looks wrong, someone knows exactly what to do next. Because when phishing campaigns look exactly like Tuesday morning, detection isn't just a controls problem. It's an ownership problem.


Prevention alone doesn't cut it

All of these tradecraft examples show us that modern social engineering doesn't force its way in. It fits in and blends in at every level across your attack surface.

Attackers don't break the workflow. They use it. They don't steal your credentials. They borrow your session. They don't spoof the domain. They rent the legitimate one. They don't invent a pretext. They let your calendar, your inbox, and your search results do it for them.

Prevention was built for a world where attacks were detectable: a shady link, an unfamiliar sender, a slightly-off domain. That world is smaller every day. When the attack arrives inside a trusted tool, a legitimate OAuth prompt, or a search result that looks identical to the real thing, the controls designed to catch it have already cleared it.

While your team sifts through an alert queue, attackers are already inside, moving laterally, exfiltrating data, positioning for extortion. The gap is a failure of the model, not the level of effort.

Figure 3: How resilient teams are building for the future

Resilient teams respond by redesigning the model itself around ownership, identity visibility, fast response, and operational clarity.


The shift: Resilience over assumption

The teams adapting fastest aren't working harder. They're making different decisions about what security is actually for.

  • Speed over volume. The Railway/EvilTokens campaign issued valid session tokens that stayed active even after password resets. Limited damage means acting on the right signals fast. 
  • Clarity over coverage. Device code phishing works because it blends into a flow that looks normal at every step. Catching it requires cross-tenant visibility into identity and session behavior.
  • Behavior over static indicators. Resilient teams are building detection around what attackers do, not just what their infrastructure looks like.
  • Ownership over ambiguity. When an alert fires and nobody knows who owns the response, even a small incident becomes a major one. Resilient teams have defined that clearly before something goes wrong. When it does, the answer to "who handles this?" isn't just another Slack thread.

Gavin Hill, Vice President of Product Marketing at Huntress, says: 

"Prevention isn't realistic anymore. Resilience comes from breach mitigation—limiting damage and recovering quickly. That's why piecemealing tools doesn't work long-term. Teams need platforms that can correlate identity, endpoint, and user behavior to support a single response."

Attackers are pressure testing your organization daily with social engineering tactics. Resilience isn't a bonus. It's the only strategy that survives contact with the reality of today’s threat landscape. 


See it in action

Your profile is already being used as intel. In the next episode of _declassified on May 20, Huntress Principal Product Researcher Truman Kain and digital safety educator Caitlin Sarian (aka "Cybersecurity Girl") will show you exactly how attackers turn your public information into an attack path. Learn how to make yourself a harder target. Register now.


Categories
Cybersecurity Education
ChatGPT logoChatGPTOpens in new tabClaude logoClaudeOpens in new tabPerplexity logoPerplexityOpens in new tabGoogle Gemini logoGoogle AIOpens in new tab
AI sparkle iconSummarize This Page
ChatGPT logoChatGPTOpens in new tabClaude logoClaudeOpens in new tabPerplexity logoPerplexityOpens in new tabGoogle Gemini logoGoogle AIOpens in new tab

What's your social profile giving away?

On May 20 (12pm EST), join Truman Kain and Caitlin Sarian ("Cybersecurity Girl") for the latest edition of _declassified and learn how attackers turn social media into intel.
Register now
Share
Facebook iconTwitter X iconLinkedin iconDownload icon
Glitch effect

You Might Also Like

  • Teach Yourself to Phish: The Strategy Behind Phishing Simulations

    Get ready for a phishing trip! Learn about the strategy behind phishing simulations and how it can help your organization build resilience against real phishing threats.
  • That “Friendly” Prompt is ClickFix

    That "friendly" prompt is a ClickFix scam. Learn about this advanced social engineering tactic that tricks users into running malicious code on their own systems, and why security resilience is your winning bet.
  • Deepfake vs. the Three-Finger Test

    See why the viral "three-finger test" is almost outdated, and how to build resilient security processes that protect your organization from identity-based attacks and social engineering, no matter how advanced the AI gets.
  • AMOS Stealer Exploits AI Trust: Malware Delivered Through ChatGPT and Grok

    Attackers are exploiting user trust in AI and aggressive SEO to deliver an evolved Atomic macOS Stealer. Learn why this social engineering tradecraft bypasses traditional network controls and the future of macOS infostealer defense.
  • Something Phishy in the /tmp Folder

    Huntress’ AI-Centric SOC recently stopped a MacSync infostealer attack on a macOS device. The malware attempted to scrape credentials, browser cookies, and crypto wallets, but Huntress contained the threat before any data was sent to the attacker. Learn how we did it.
  • Riding the Rails: Threat Actors Abuse Railway.com PaaS as Microsoft 365 Token Attack Infrastructure

    Railway PaaS is being weaponized as a clean token replay engine in an active AiTM and device code phishing campaign impacting 268+ M365 organizations and 100+ MSPs.
  • Rogue RMMs: Common Social Engineering Tactics We Saw in 2025

    From lures involving Social Security statements to top domains and hashes used in attacks, here's an in-depth look at incidents involving ScreenConnect in 2025.
  • Recap: Navigating the NIST Cybersecurity Framework

    If you follow the NIST cybersecurity framework, you'll ensure that your money is spent on the right areas to build an effective defense strategy.

Sign Up for Huntress Updates

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
Privacy • Terms
By submitting this form, you accept our Terms of Service & Privacy Policy
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 250k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy