As reported by the Microsoft Threat Intelligence Center (MSTIC), we are currently witnessing a new, high-volume wave of sophisticated spear-phishing attacks. This campaign marks a significant escalation in nation-state tradecraft for the 2026 threat landscape.
Beginning in late December 2025, over 3,000 individual accounts across 150 organizations have been targeted by malicious nation-state groups. The attackers have weaponized trust by hijacking the widely-used Constant Contact mail management system. By distributing emails that appear to originate from legitimate bodies like USAID, hackers have successfully tricked recipients into opening their systems to compromise.
The “Invisible” Campaign
In this clever and continuing threat, even large and well-protected organizations have struggled to block the incoming emails.
The hackers are using an evolving campaign structure designed to evade modern AI-driven filters:
- Unique Sender Identities: Attackers create individual accounts unique to each recipient target.
- Evasion of Detection: This granular targeting makes it incredibly difficult for standard secure email gateways (SEGs) to “pattern match” and capture the menacing emails before delivery.
The Infection Chain: Once a recipient clicks a link or PDF in the email, a rapid chain of events is triggered:
- A virtual external drive is silently created on the endpoint.
- Malicious software is executed immediately to deliver a payload.
- Data collection begins instantly to increase profiling of the target organization for future lateral movement.
๐ก๏ธ How to Protect Your Organization
To avoid becoming a victim of this 2026 campaign, immediate vigilance is required. Please disseminate the following protocols to your teams:
- ๐ซ STOP and VERIFY: Do not click links in emails, even from “trusted” sources, without out-of-band verification.
- ๐ป Install Protective Software: Ensure all endpoints have updated software specifically tuned to detect malicious email patterns and behavioral anomalies.
- ๐งฑ Block Mode is Essential: Run your Endpoint Detection & Response (EDR) service in BLOCK mode. Detection alone is too slow for this threat.
- ๐ Hunt Unmanaged Devices: Locate and isolate unmanaged devices on your network; these are the preferred entry points for nation-state actors.
- ๐ Hardened Authentication: Enforce Multifactor Authentication (MFA). Ideally, move to FIDO2/hardware keys, but at a minimum, ensure two-step verification is active on all accounts.
๐ Training is Your Best Defense
Technology catches the threats you know; training catches the threats you don’t.
Upgrade your team’s threat recognition capabilities. Train with AUMINT.io to ensure your staff can identify these advanced nation-state techniques before they click.
This article was researched and written by our team, with AI assistance used solely for copy-editing and rephrasing to improve readability.

To see our team in action, please join us for our weekly webinar every Tuesday.