According to a recent LinkedIn post from Censys, a Censys ARC researcher has been tracking a phishing operation known as OLUOMO that uses adversary‑in‑the‑middle (AiTM) techniques. The post describes how this campaign relies on fake document portals to intercept Microsoft credentials and session tokens.
Claim 55% Off TipRanks
- Unlock hedge fund-level data and powerful investing tools for smarter, sharper decisions
- Discover top-performing stock ideas and upgrade to a portfolio of market leaders with Smart Investor Picks
The LinkedIn post indicates that the operation appears to span compromised websites, Azure‑hosted proxies, and Microsoft OAuth infrastructure. It also notes that the lure leverages a real U.S. naturalization petition, apparently to increase credibility with targeted users.
For investors, the post suggests that Censys is actively engaged in high‑end threat research focused on emerging phishing techniques against widely used cloud productivity platforms. This type of research exposure could enhance Censys’s brand as a specialist in cloud and identity security visibility.
The focus on sophisticated AiTM phishing targeting Microsoft credentials may position the company to benefit from growing enterprise demand for tools that detect credential theft and session hijacking. If Censys can translate this research into commercial capabilities or differentiated threat intelligence, it could support product adoption and strengthen its competitive standing in cybersecurity markets.

