PUBlished on
September 19, 2024
updated on
November 5, 2025

Life of a Phish

SHUYANG WANG & FARAH IYER

Recently, we detected a phishing attack targeting one of our customers. In this blog post, we analyze the attack’s life cycle to show why you need a thoughtful solution to defend against sophisticated identity threats.

What Happened?

In a customer environment testing Obsidian’s browser extension, we observed two critical alerts triggered by the same user identity:

  1. Phishing Attempt: Flagged by our browser extension.
  2. Account Takeover Attempt: Detected within a minute by our threat intelligence system.

After investigating the user’s activity timeline, here’s how the attack unfolded:

Upon closer inspection, we discovered the phishing site used Cloudflare turnstiles to evade traditional detection methods. Despite the customer having an email security gateway (ESG) in place, it failed to catch the attack.

Life of a Phish

While this might seem like a routine phishing attempt, it underscores the complexity of modern phishing techniques. Successful attacks navigate multiple layers of an organization’s defenses across the tech stacks.

A Typical Phishing Path

Here’s a simplified view of the phishing attack:

  1. Phishing email delivered to corporate email address
  2. User visits phishing site from a browser on a corporate device.
  3. Login credentials are stolen through AiTM techniques, and further attacks on SaaS applications are attempted.

Traditional defenses like email security filters can only go so far. As attackers evolve, they use techniques like CAPTCHA to bypass these defenses.

Alternate Attack Pathways

While the example above focuses on email-based phishing, attackers often employ alternative methods to circumvent corporate security:

These methods are frequently used in targeted attacks, exploiting personal information readily available online.

Securing the Stack

Phishing attacks span multiple layers of the tech stack, including:

The permutation of these tech stacks creates many attack paths, and the complexity of securing every layer grows exponentially. This underscores the need for robust security architecture.

Building an Effective Defense

To defend against phishing, organizations must evaluate their security controls across all layers. A key strategy is to identify choke points—critical areas that attackers cannot bypass. In SaaS environments, two natural choke points emerge:

  1. The SaaS application: Monitoring and logging every interaction at the application layer ensures visibility into any suspicious behavior.
  2. The browser: Most SaaS interactions occur through a browser, making browser security essential in preventing phishing attacks.

At Obsidian, our strategy focuses on these choke points. Our browser extension provides real-time phishing detection and administers warnings when users visit malicious sites. If an attack slips past the browser extension, our detection systems analyze SaaS activity logs to identify suspicious behaviors, stopping potential breaches before they escalate.

Final Thoughts

Phishing attacks are evolving, with attackers finding creative ways to bypass traditional defenses. A layered approach that secures critical control points—such as the browser and SaaS applications—is key to preventing account takeovers and protecting against identity-based threats. Combining browser-based protection with SaaS monitoring and conditional access policies offers a strong defense against even the most sophisticated phishing attempts.

Frequently Asked Questions (FAQs)

How do modern phishing attacks bypass traditional email security gateways?

Modern phishing attacks use advanced evasion tactics like CAPTCHA challenges and hosting phishing sites on reputable services such as Cloudflare. These methods are designed to evade detection by traditional email security gateways, allowing phishing emails and malicious links to reach end users even when an Email Security Gateway (ESG) is in place. ---

What is an adversary-in-the-middle (AiTM) attack in the context of phishing?

An adversary-in-the-middle (AiTM) attack is a technique where attackers intercept communication between a user and a legitimate service, such as Microsoft 365, often via a fake login page. This allows attackers to steal login credentials and session tokens, potentially bypassing multi-factor authentication and enabling access to SaaS applications. ---

Why is browser security critical in defending against SaaS phishing attacks?

Browser security is crucial because most SaaS interactions and login attempts take place within web browsers. Solutions like Obsidian's browser extension provide real-time phishing detection, alerting or blocking users when they attempt to visit malicious sites, thus stopping attacks at an early stage before credentials are compromised. ---

Can phishing attacks target employees through channels other than corporate email?

Yes, attackers frequently use alternative channels such as personal email accounts and SMS messages (smishing) to bypass corporate security filters. These channels are especially vulnerable because they often lack enterprise-grade threat protection, and attackers can easily obtain personal contact details from online sources. ---

You May Also Like

Get Started

Start in minutes and secure your critical SaaS applications with continuous monitoring and data-driven insights.

get a demo