Behavioural protection
Operates on the page behaviour at destination, not on the delivery channel. Effective even when the message bypasses SEG, sandbox and DNS filters.
AiTM attacks don't just steal credentials: they capture the session token after authentication, making MFA useless. Fortgale blocks the attack before the user interacts with the malicious proxy.
Classic anti-phishing solutions intervene before delivery. Fortgale operates where traditional filters fail: at the moment when the user is about to surrender credentials.
Operates on the page behaviour at destination, not on the delivery channel. Effective even when the message bypasses SEG, sandbox and DNS filters.
Designed for AiTMs that bypass MFA: acts before the token is generated in a fraudulent context, making theft structurally impossible.
No changes to DNS, mail servers or M365 tenant. Guided onboarding in a few hours. Compatible with FIDO2, TOTP, hardware keys and all MFA providers.
The AiTM proxy makes MFA useless. The only defence is to act on the destination page, before the user types.
The phishing email bypasses SEG, sandbox and DNS filters. It contains a link to a seemingly legitimate AiTM proxy.
The user clicks. The transparent proxy (Evilginx, Modlishka, Muraena) relays traffic to the real M365 portal.
The user enters credentials and the second factor. The proxy captures everything: password and MFA code.
Microsoft issues the session token. The proxy intercepts and reuses it autonomously, bypassing MFA.
The Interceptor detects the proxy and blocks the user before step 1. No data is ever transmitted.
Operates on the destination page behaviour, not on the delivery channel. Effective even when the message bypasses SEG, sandbox and DNS filters.
Designed for AiTMs that bypass MFA: acts before the token is generated in a fraudulent context, making theft structurally impossible.
No changes to DNS, mail servers or M365 tenant. Guided onboarding in a few hours, with no impact on user productivity.
Protection for both Microsoft 365 (Exchange Online, SharePoint, Teams) and Google Workspace (Gmail, Drive, Meet).
Powered by the Fortgale Intelligence Feed: new AiTM infrastructure, emerging phishing kits, lookalike domains detected and blocked in real time.
Centralised dashboard of intercepted attacks, users involved, target sectors. CISO reporting with MTTD/MTTR metrics and monthly trends.
360° identity security from on-prem AD to Entra ID and Cloud. Detection & response on compromised credentials.
Discover ITDR →EDR/XDR governed by the European SOC. Triage in <15 min, containment ~11 min.
Discover MDR →34k+ IoCs per week · AiTM phishing domains, Evilginx/Modlishka kits, C2 infrastructure distributed via STIX/TAXII.
Discover the Feed →Adversary-in-The-Middle: a transparent proxy between user and legitimate site (M365). Captures credentials and MFA tokens, bypassing authentication. Dominant technique in advanced European campaigns. Frameworks: Evilginx, Modlishka, Muraena.
Detects in real time the characteristic signals of AiTM proxy pages and displays a warning before credentials are entered. Analyses page and session behaviour, not the email channel.
MFA protects static credentials (username/password) but not the session token issued after authentication. The AiTM proxy receives the valid token — even after the second factor — and reuses it autonomously. The Interceptor acts earlier.
Yes. AiTM campaigns against Google are growing in manufacturing, logistics and professional services. Identical logic: a warning before credentials are entered.
Fast, non-invasive onboarding. No changes to infrastructure, mail servers, DNS, M365 tenant. Activation in a few hours. Team response within 24 working hours.
The Fortgale M365 Phishing Interceptor blocks AiTM phishing before credentials are entered — and before the session token is stolen. Free activation, no infrastructure changes, operational in a few hours.
No nurturing sequences, no auto-replies. One of our analysts calls you back within one business day.
The full Report (executive summary · operational IoCs · technical runbook) is restricted. Share two details and one of our analysts contacts you with access and a short technical briefing.
Response in 30 minutes, containment in 1–4 hours. Even if you are not a Fortgale customer.