1. Why This Attack Vector Persists
Phishing works because it targets the person, not the system. A convincing email bypasses firewalls, EDR, and patch management in one click. Detecting it means watching for anomalies in the authentication layer — unusual login times, unfamiliar IPs, MFA prompts the user didn't initiate.
This category goes well beyond classic email lures. Credential harvesting pages, MFA fatigue attacks, token and session theft, and social engineering designed to push users into approving malicious access all belong here. The attacker doesn't need to exploit software if they can exploit trust.
Strong perimeter and endpoint controls don't protect an organization whose identity workflows, account recovery procedures, and user reporting culture are weak. Those gaps are exactly where this vector lands.