Microsoft Details Yearlong Office 365 Phishing Campaign. During the year, the Microsoft researchers found that the attackers behind the campaign changed their tactics and techniques, including obfuscation and encryption mechanisms, about every 37 days on average to help avoid detection by security teams. The researchers also found the attackers broke the H TML files into multiple segments, which helped make the code look benign to security tools.