Explore more publications!

ANY.RUN Reveals Active Cyberattack Campaigns Targeting Five Critical German Industries in Q2 2026

DUBAI, DUBAI, UNITED ARAB EMIRATES, April 13, 2026 /EINPresswire.com/ -- ANY.RUN, the interactive malware analysis platform trusted by over 600,000 cybersecurity professionals worldwide, documented active phishing campaigns targeting German organizations across five critical industry sectors between January and March 2026.

Real-world attacks on finance, healthcare, IT, telecom, and manufacturing organizations present the growing threat to Germanyโ€™s economy and emphasize the limits of MFA as a standalone defense. The findings are based on threat investigations conducted using ANY.RUNโ€™s Interactive Sandbox and Threat Intelligence solutions.

The research highlights how attackers are increasingly focusing on identity compromise, phishing, and session hijacking techniques to gain access to corporate environments and disrupt business operations.

๐—ž๐—ฒ๐˜† ๐—™๐—ถ๐—ป๐—ฑ๐—ถ๐—ป๐—ด๐˜€

โ€ข MFA was bypassed in all five attacks. EvilProxy, EvilGinx2, and FlowerStorm (commercially available phishing-as-a-service platforms) intercepted authenticated session cookies in real time, granting attackers full account access without requiring passwords or one-time codes.

โ€ข All five campaigns show signs of deliberate sector targeting. In several cases, phishing infrastructure was registered using the target companyโ€™s name, indicating advance reconnaissance.

โ€ข Social engineering lures were adapted to professional context. Attackers used salary-themed documents for finance employees, missed Microsoft Teams voice messages for manufacturing executives, and โ€œReview documentโ€ prompts for IT professionals, tailoring each lure to the victimโ€™s working environment.

โ€ข Legitimate platforms masked every attack. Mailchimp, Cloudflare Workers, Amazon SES, Format.com, and Microsoftโ€™s own OAuth infrastructure were all used as routing layers, making attacks nearly invisible to conventional email and web filters.

โ€ข ANY.RUNโ€™s Threat Intelligence Lookup identified more than 220 tasks linked to EvilProxy and FlowerStorm campaigns targeting German organizations in the 60 days prior to publication โ€” confirming systematic, ongoing pressure rather than isolated incidents.

๐—”๐˜๐˜๐—ฎ๐—ฐ๐—ธ๐˜€ ๐—”๐—ป๐—ฎ๐—น๐˜†๐˜‡๐—ฒ๐—ฑ

โ€ข Finance: FlowerStorm spearphishing campaign targeting a German private equity and hedge fund firm, delivering Microsoft 365 credential theft via QR-code PDF, browser fingerprinting, and a fake OAuth login flow.

โ€ข Healthcare: Microsoft OAuth 2.0 abuse targeting Germanyโ€™s largest medical research center, rerouting victims through a compromised WordPress site and decentralized storage to a fake Outlook login page with POST-based exfiltration.

โ€ข Technology: Combined EvilProxy and EvilGinx2 reverse-proxy attack on a German IT company, chaining Mailchimp tracking links, a compromised WordPress site, and Cloudflare Workers to deliver a real-time MFA-bypassing Microsoft login proxy.

โ€ข Telecommunications: EvilProxy phishing-as-a-service campaign targeting a German telecom provider, routing victims through a legitimate portfolio platform to a fake secure document portal before proxying Microsoft 365 authentication.

โ€ข Manufacturing: Highly targeted EvilProxy campaign against a global German chemical conglomerate, delivered via Amazon SES with Microsoft Teams voice message lure, custom company-branded phishing pages, and Okta credential harvesting.

The full article is available in ANY.RUN Cybersecurity Blog.

๐—”๐—ฏ๐—ผ๐˜‚๐˜ ๐˜๐—ต๐—ฒ ๐—ฆ๐—ผ๐—น๐˜‚๐˜๐—ถ๐—ผ๐—ป๐˜€ ๐—จ๐˜€๐—ฒ๐—ฑ ๐—ถ๐—ป ๐—ง๐—ต๐—ถ๐˜€ ๐—ฅ๐—ฒ๐˜€๐—ฒ๐—ฎ๐—ฟ๐—ฐ๐—ต

ANY.RUN Interactive Sandbox allows security analysts to safely execute suspicious files and URLs in an isolated cloud environment, capturing every network connection, process, redirect, and script call in real time.

ANY.RUN Threat Intelligence Lookup is a searchable database of threat indicators, threat families, and behavioral patterns drawn from millions of sandbox analyses. Security teams use it to identify active attack infrastructure, search for indicators of compromise relevant to their industry and geography, and enrich security alerts with actionable context.

ANY.RUN TI Feeds deliver verified, structured indicators of compromise directly into SIEM platforms, firewalls, DNS filters, and SOAR systems โ€” automatically, in real time.

๐—”๐—ฏ๐—ผ๐˜‚๐˜ ๐—”๐—ก๐—ฌ.๐—ฅ๐—จ๐—ก

ANY.RUN is a cybersecurity platform that provides interactive malware analysis and threat intelligence solutions to over 15,000 security teams worldwide. Since 2016, the company has supported over 600,000 users, including enterprises and Fortune 100 organizations, in detecting, analyzing, and responding to cyber threats.

ANYRUN FZCO
ANYRUN FZCO
+ +1 657-366-5050
email us here
Visit us on social media:
LinkedIn
X

Legal Disclaimer:

EIN Presswire provides this news content "as is" without warranty of any kind. We do not accept any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information contained in this article. If you have any complaints or copyright issues related to this article, kindly contact the author above.

Share us

on your social networks:
AGPs

Get the latest news on this topic.

SIGN UP FOR FREE TODAY

No Thanks

By signing to this email alert, you
agree to our Terms & Conditions