Having spent a lot of 2024 and 2025 focusing on initial access, I thought it might be useful to make a summary of recent public developments and techniques which have become popular in recent months. This will focus heavily on initial access payloads and less on general OSINT techniques, though these still have a place!
Before we start, I wanted to call out the Initial Access Guid and BreakDev Red Discord’s, which have been a great source of inspiration and learning! In addition, there are some blogs and videos which I would strongly recommend watching for anyone interested in learning more about initial access and OSINT:
- A series of posts by Forrest Kasler on phishing approaches and considerations (https://posts.specterops.io/teach-a-man-to-phish-43528846e382)
- Seriously, read it end to end!
- Payload wizardry from Mariusz Banach (https://youtu.be/CwNPP_Xfrts & https://youtu.be/DyyD48iKsKE)
- A talk by Tony Gee in 2023 summarising OSINT and phishing approaches (https://youtu.be/xQn4muZlf8w)
- More ‘advanced’ considerations for hiding payloads from Kuba Gretzky (https://youtu.be/Nh99d3YnpI4)
Vishing
According to CrowdStrike, vishing increased in popularity by 442% in H2 2024, as well as Scattered Spider performing several high profile compromises leveraging vishing in several forms, highlighting how effective and flexible this technique can be. For example, it can suit a range of pretexts and levels of access whilst avoiding a large number of the detections which exist via other methods, such as EDR or mail filtering. Some of the commonly used pretexts include:
- Vishing the IT Service Desk to obtain password and/or MFA resets for an account
- Vishing a user directly to get them to reveal credentials, execute a payload or consent to a malicious OAuth application
- Perform ‘internal’ vishing to privilege escalate or move laterally, if access has already been obtained.
- Combining phishing and vishing to increase the legitimacy of phishing emails
Some recent threat intelligence from Google suggests that UNC6040 has been using vishing in a different way. In their example, the attackers called end users whilst posing as members of IT support. On the call they would then ask the users to authorise a third party application against their SalesForce instance, allowing for exfiltration of sensitive data through OAuth permissions. This is an interesting approach, as by not relying on code execution or credential theft, detection is made even more challenging again.
AI is often closely linked to vishing attacks, though at the time of writing there are not many good end-to-end examples of AI-powered vishing publicly available. Current models can do pre-recorded or simplistic calls well, but struggle on more complex calls and especially when video content is required. Though this is likely just a matter of time until the models improve in capability!
Device Codes
Device codes have exploded in popularity recently, notably with Microsoft’s implementation being leveraged by threat actors. For those who dont know, this allows attackers to generate a code which the victim enters into a legitimate site, such as https://microsoft.com/devicelogin. After entering the code and authenticating with their account, we are able to request access tokens as the victim from the service in question.
A number of services beyond Microsoft support this authentication flow, with some covered in separate blog posts:
- GitHub – (https://www.praetorian.com/blog/introducing-github-device-code-phishing/)
- NPM (https://deceptiq.com/blog/from-phish-to-package-npm-supply-chain-attacks)
Notably, whilst Google does technically support the device code authentication flow, it is heavily limited. This technique isnt just about identity providers though – due to it being within the OAuth 2.0 RFC, a lot of applications support this… But more on this another day!
There are a number of really interesting things you can do here, to leverage device codes in payloads, but again that will have to wait!
FileFix/ClickFix
FileFix and ClickFix are two related techniques which encourage end users into copying a command and pasting it within a location which will execute the code. In the case of FileFix, this is generally within the address bar of a file explorer. For ClickFix this is generally either a terminal-style application, or within the Run dialog.
Whilst ClickFix is an older technique, it is still widely used by various threat actors following John Hammond’s early proof-of-concept which led to an increase in ReCaptcha-based payloads. According to ESET, ClickFix-style attacks were up 500% in H1 2025 compared to H2 2024. Group-IB have a great summary of approaches seen in the wild, showing how varied this technique can be. Some of the common pretexts in public examples include:
- CloudFlare-styled ‘authentication’ requiring a command to be run
- The ReCaptcha example mentioned above
- Various approaches where the target must ‘authenticate’ themselves by running a command
Whilst most blog posts focus on Windows, this is still an effective technique against Mac devices which havent been hardened against the various LoLBAS-style commands. Some example commands are covered by the Mac-specific ‘LOOBins’ project. Delivr.to make a specific mention of osascript being leveraged in campaigns.
MacOS
MacOS has unusually had several initial access techniques be revealed in the past few months, with two talks by SpecterOps at SOCon revealing new initial access techniques:
These are particularly interesting, as they allow for more novel means of gaining initial access without relying on the classic usage of curl/wget and piping into bash or similar.
Additionally, a post by eSentire covered a campaign which used a DMG file to coerce users into dragging and dropping a file onto the Terminal, bypassing Gatekeeper. This technique does have several steps (and potential drawbacks), but it allows for a high degree of flexibility in payload delivery. A screenshot from their blog is below.

AI/Prompt Injection
An ‘emerging’ vector leverages prompt injection to poison the models of AI systems. As these systems and tools increasingly monitor more areas of our corporate lives, they are gaining the ability to read and parse a greater range of information. Naturally, if they are parsing attacker-controllable information, this can present some new avenues of attack. This is not news to anyone involved in cyber, but ‘in the wild’ examples beyond simple proof-of-concepts have been slow to emerge.
An early example was presented at Black Hat 2024, with a talk on injection attacks against CoPilot from email content. Since then, a number of other techniques have have been discovered, such as EchoLeak and attacks against Gemini AI. Datadog have also released details on a CoPilot Studio-based attack, which could lead to very convincing OAuth and credential capturing lures.
As with all AI-based attacks, this is unlikely to be resolved any time soon, especially with the growing demand for AI across applications and business use cases.

Credential Capture
Credential capture payloads continue to be a viable technique, though awareness of this approach does make it more challenging. The re-use of any captured credentials is increasingly requiring attention to detail, to ensure that the re-use is not caught by Conditional Access Policies or similar. Kuba Gretzky has delivered two really useful talks at x33fcon on this subject, focusing on evasion of defensive products, as well as some specific detections during the authentication process, such as CSS canaries.
Final Thoughts
Outside of the techniques mentioned above, a number of ‘older’ techniques are still highly effective, and are worth checking, such as credential reuse or stuffing attacks using stealer logs. Whilst perimeters are becoming increasingly secure, I commonly see exposed information in areas which are less heavily monitored by run of the mill ASM solutions. For example, credentials or internal terms within code sharing sites such as GitHub, StackOverflow, personal blogs and so on. Thinking a little outside the box can often reveal unexpected findings and key information.
In terms of payload delivery, the LOTS Project remains a big player, with a number of services which can be exploited for a number of uses. Common business applications are also a versatile option, though ensure you are compliant with the providers terms and conditions if you are to use them! With the ongoing shift to SaaS and cloud-hosted solutions, companies are using an every expanding list of products and services. Often these services have their own pitfalls or ability to be leveraged by attackers.





















