Alchemy Tech Group

Inside VENOM:

The PhaaS Platform Behind Targeted C-Suite Credential Theft

Abnormal AI and Alchemy are hosting invitation-only briefing on VENOM, a previously undocumented phishing-as-a-service platform used by attackers to neutralize MFA and compromise executive accounts. You'll learn how this campaign is designed to evade traditional security tools and what you can do to reduce your risk.

In This Briefing

Understand the full attack lifecycle

See why rules- and signature-based defenses miss it

Explore where attacker tactics are heading next

Get concrete steps to minimize your vulnerability now

* Attendees are also eligible for a custom threat intelligence brief tailored to their industry

Secure Your Invite

Session

Wednesday, May 20

4:00 PM UTC · 60 min

Loading...

Submitting this form signals your interest in attending. A member of our team will review your request and follow up to confirm your eligibility.

Why This Matters

Modern email attacks target the people and processes that run the business.

This session walks through a five-month active campaign targeting named C-suite leaders, showing how attackers hijack Microsoft 365 authentication flows to gain persistent access that survives password resets.

01

Executives targeted by name

These are not mass campaigns. The operators research individual targets, with lures that reference names and company context, dynamically generated from the target’s email address, before any payload is delivered.

Why this is different

Precision at this level signals purpose-built infrastructure for high-value targets. This is not opportunistic spray-and-pray.

02

Persistence that survives remediation

Once a target completes the campaign’s authentication flow, access persists through attacker-enrolled MFA devices or captured OAuth refresh tokens, depending on the mode—even after standard remediation steps are taken.

Why this is different

Standard IR assumes credential resets contain the breach. This campaign is designed to operate below that layer.

03

Legitimate Microsoft infrastructure as the weapon

In AiTM mode, targets act with a real, real-time proxied Microsoft sign-in. In Device Code mode, they authenticate directly at Microsoft’s own login page.

Why this is different

Blocking phishing URLs doesn’t help when the authentication page is real. This campaign weaponizes Microsoft’s own infrastructure.

04

Designed to evade your current stack

SEGs, MFA enforcement, and conditional access policies have limited visibility into the authentication and token layer this campaign exploits. Unicode-rendered QR codes leave no image artifact for scanners to process.

Why this is different

Detection requires behavioral analysis of authentication activity and token usage—not signature-based controls alone.

What You'll Learn

The anatomy of this campaign and how to protect your organization.

01

The Attack Chain

Walk through the full lifecycle of an attack—from initial phishing email to persistent account access—and understand each stage where defenses can intervene.

02

Why Existing Controls Fail

Learn why MFA, conditional access, and legacy email gateways are insufficient against the campaign’s authentication exploitation techniques.

03

How Tradecraft Is Evolving

Understand how phishing-as-a-service platforms like VENOM are professionalizing attacks and what this means for the threat landscape in 2026 and beyond.

04

Actions to Reduce Exposure

Get a concrete set of steps your security team can take this week to reduce exposure to this type of campaign and similar account takeover threats.

Who Should Attend

Your executives are the target. Make sure the right people are briefed.

Why attend as a

CISO

Understand how executive-targeted attacks bypass controls you’ve already invested in — and what gaps require an architectural response.

Your Hosts

Meet the team that discovered VENOM.

Hosted by Abnormal AI's Threat Intelligence team and Alchemy Tech Group, this closed-door session provides a first look at the campaign and concrete steps to protect your organization.

Ryan Devendorf

Ryan Devendorf

Threat Intelligence Researcher

Ryan is a principal researcher on the team that mapped VENOM's full attack chain and identified its persistence mechanisms.

Mark Grassmann

Mark Grassmann

Practice Director, Cybersecurity, Alchemy Tech Group

Mark Grassmann is a cybersecurity thought leader and industry expert known for turning complex security challenges into clear, actionable strategies. He partners with organizations across the country to design and execute modern cybersecurity programs.

Read the Complete VENOM Threat Report

The full technical report covers VENOM's attack chain, infrastructure signatures, behavioral indicators, and detection guidance — written by the researchers who discovered and tracked the platform.

Get the Report

Limited Availability

Request Your Invitation

This invitation-only session is limited to qualified security leaders. Reserve your spot and a member of our team will confirm your eligibility.