Researchers Find Hackers Using Bubble.io to Steal Microsoft Credentials

Researchers Find Hackers Using Bubble.io to Steal Microsoft Credentials

You are currently viewing Researchers Find Hackers Using Bubble.io to Steal Microsoft Credentials
Fake login pages can look identical to real sign-in screens — but entering your details may give attackers access to your account.

Cybercriminals used a trusted app builder to create fake Microsoft login pages and steal user data. Here’s how the attack works and why safe-looking links still put your accounts at risk.

What Happened

According to TechRadar, cybercriminals are using the no-code platform Bubble.io to create fake login pages.

These pages are designed to look like real Microsoft 365 sign-in screens. When users enter their credentials, attackers capture their login details.

Importantly, this is not a data breach — attackers didn’t hack the platform. Instead, they are using a legitimate tool to carry out the scam.

How This Attack Happened

Attackers use Bubble.io to create pages that closely copy the real Microsoft 365 login screen — same layout, logo, and fields.

Bubble automatically hosts these pages on its own domain (for example, login-check.bubble.io). Because this is a real and trusted domain, email filters often treat the link as safe and the messages go straight to the inbox.

Attackers then send emails that look like Microsoft alerts (for example, “unusual sign-in” or “account needs verification”) and include a link to the fake page.

Sometimes they add a fake “security check” screen before the login page to make the process feel more official and reduce suspicion.

When users click the link and enter their details, the attackers collect data instantly.

Microsoft sign-in approval request screen showing two-factor authentication prompt
Scammers can copy this sign-in request to trick users into giving access to their account.

How Users Could Be Affected

If you click the link and enter their login details, attackers can gain access to their Microsoft 365 account.

This can lead to:

  • stolen emails and sensitive data
  • account takeover
  • further attacks on coworkers, family members, or organizations
  • potential financial fraud or ransomware incidents

More advanced versions of this attack can even steal two-factor authentication (2FA) codes.

What Bubble Says

Bubble.io responded to the reports, saying:

“We are aware of reports that bad actors have attempted to misuse Bubble-hosted applications as part of phishing campaigns.”

The company said it has safeguards to stop abuse, takes action when needed, and keeps improving protection for users.

Why This Phishing Method Will Spread Quickly

Researchers warn that this scam trick is likely to become more common — and the trend proves it.

According to the FBI, phishing remains the most reported cybercrime, with hundreds of thousands of complaints each year.

At the same time, platforms like Bubble.io make it easy for even less-skilled attackers to create convincing phishing pages. This method may soon be added to “Phishing-as-a-Service” kits — ready-made tools that allow criminals to launch attacks at scale.

As a result, more phishing emails may start appearing directly in inboxes instead of spam folders.

Futureproof monitors your digital safety and alerts you early — before small risks grow into bigger problems. Get started today to stay protected all year long.

What This Case Shows

This case highlights a growing shift in cybercrime: attackers are no longer relying on suspicious or fake websites.

Instead, they are using trusted platforms to make scams harder to detect and more believable.

It also shows that:

  • a “safe-looking” link does not always mean it is safe
  • email security filters can be bypassed
  • human attention — not technology — is often the last line of defense

Before you sign in, pause and check the link. Going directly to the official site is the safest habit and a simple step that can prevent serious account problems.