Overview
Detect and block Adversary-in-the-Middle (AitM) phishing attacks targeting Microsoft 365 and Azure login pages.
**About** AitM Block, developed by Eye Security, helps protect you against advanced Microsoft Adversary-in-the-Middle (AitM) phishing attacks. These attacks are designed to steal credentials and session tokens by intercepting communication between you and legitimate Microsoft services, making them far more dangerous than traditional phishing. This extension focuses on detecting suspicious pages that mimic Microsoft login pages, reducing the risk of credential theft before you interact with these phishing pages. It works silently in the background and does not interfere with normal browsing or legitimate Microsoft pages. **Features** ✓ Detects and warns about suspicious Microsoft-style login elements commonly used in AitM phishing campaigns. ✓ Lightweight and non-intrusive: does not affect normal browsing. ✓ Works on Chrome and Chromium-based browsers, such as Edge. ✓ Free to use: our way of giving back to the cybersecurity community. **Disclaimer** ⮞ This extension monitors every webpage you visit to detect potentially malicious Microsoft login pages. ⮞ In rare cases, it may detect legitimate websites that use similar design elements: in this case, you can dismiss the warning. ⮞ Provided “as is,” without warranty of any kind. Use at your own risk. Eye Security is not responsible for any damage, data loss, or disruption caused by use or misuse of this extension.
0 out of 5No ratings
Details
- Version0.1.1
- UpdatedDecember 10, 2025
- Size29.67KiB
- Languages4 languages
- DeveloperEye Security B.V.Website
Saturnusstraat 60, Unit 54 Den Haag 2516 AH NLEmail
chromewebstore@eye.securityPhone
+31 6 53625675 - TraderThis developer has identified itself as a trader per the definition from the European Union and committed to only offer products or services that comply with EU laws.
- D-U-N-S494512260
Privacy
This developer declares that your data is
- Not being sold to third parties, outside of the approved use cases
- Not being used or transferred for purposes that are unrelated to the item's core functionality
- Not being used or transferred to determine creditworthiness or for lending purposes