Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

FBI warns about expanded spider attacks on airline using social engineering

June 28, 2025

The new AI Facebook tool asks for upload your photos for plot ideas, causing privacy trouble

June 28, 2025

From the theft of the browser to the intelligence collection instrument

June 28, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » ‘Rockstar 2FA’ Phishing as a Service Targets Microsoft 365 Users with AiTM Attacks
Global Security

‘Rockstar 2FA’ Phishing as a Service Targets Microsoft 365 Users with AiTM Attacks

AdminBy AdminNovember 29, 2024No Comments3 Mins Read
Phishing-as-a-Service
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


November 29, 2024Ravi LakshmananCybercrime / Cloud Security

Phishing as a service

Cyber ​​security researchers warn of malicious email campaigns that use phishing as a service (PhaaS) a set of tools named Rockstar 2FA to steal Microsoft 365 credentials.

“This campaign uses an AitM (adversary-in-the-middle) attack that allows attackers to intercept user credentials and session cookies, meaning that even users with multi-factor authentication (MFA) enabled can still be vulnerable,” — Diane, Trustwave Researcher. Solomon and John Kevin Adriano said.

Rockstar 2FA is rated as an updated version DadSec (aka Phoenix) phishing kit. Microsoft tracks the developers and distributors of the Dadsec PhaaS platform under an alias Bura-1575.

Cyber ​​security

Like its predecessors, the phishing kit is advertised through services such as ICQ, Telegram and Mail.ru on a $200 bi-weekly (or $350 monthly) subscription model, allowing cybercriminals with little or no technical experience . companies at scale.

Some of Rockstar 2FA’s advertised features include two-factor authentication (2FA) bypassing, 2FA cookie collection, anti-bot protection, login page themes that mimic popular services, completely undetectable (FUD) links, and Telegram bot integration.

It also claims to have a “modern, user-friendly admin panel” that allows customers to track the status of their phishing campaigns, create URLs and attachments, and even personalize themes that are applied to generated links.

The email campaigns identified by Trustwave use various initial access vectors, such as URLs, QR codes and document attachments, which are embedded in messages sent from compromised accounts or spamming tools. Emails use a variety of attractive templates, from file sharing notifications to electronic signature requests.

Apart from using legitimate link redirectors (eg shortened URLs, open redirects, URL protection services or URL rewriting services) as a mechanism to bypass anti-spam detection, the kit includes anti-bot checks using Cloudflare Turnstile in an attempt to prevent automated analysis of AitM phishing pages.

Phishing as a service

Trustwave said this is observed the platform uses legitimate services such as Atlassian Confluence, Google Docs Viewer, LiveAgent and Microsoft OneDrive, OneNote and Dynamics 365 Customer Voice to host phishing links, emphasizing that threat actors take advantage of the trust that comes with such platforms.

“The design of the phishing page closely resembles the login page of the impersonated brand, despite ​​the many obfuscations applied to the HTML code,” the researchers said. “All data submitted by the user on the phishing page is immediately sent to the AiTM server. The stolen credentials are then used to obtain the target account’s session cookies.”

Cyber ​​security

Disclosure occurs as Malwarebytes in detail a phishing company called Beluga that uses .HTM attachments to trick email recipients into entering their Microsoft OneDrive credentials in a fake login form, which are then passed to a Telegram bot.

Phishing links and fraudulent social media bidding ads have also been found to push adware such as MobiDash and fraudulent financial apps that steal personal data and money under the guise of promises of quick returns.

“Promoted betting games are presented as a legitimate opportunity to win money, but they are carefully designed to trick users into depositing funds they may never see again,” Group-IB CERT analyst Mahmoud Masaad. said.

“Through these fraudulent apps and websites, scammers steal both users’ personal and financial information during the sign-up process. Victims can suffer significant financial losses, with some reporting losses of more than US$10,000.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

FBI warns about expanded spider attacks on airline using social engineering

June 28, 2025

The new AI Facebook tool asks for upload your photos for plot ideas, causing privacy trouble

June 28, 2025

From the theft of the browser to the intelligence collection instrument

June 28, 2025

More than 1000 SOHO devices hacked in China associated with cyber-science associated with cyber

June 27, 2025

Posted and Pubshell Sarsware used in Tibet’s Mustang Panda attack

June 27, 2025

The Chinese Silver Fox Group uses fake web -sats to deliver Sainbox Rat and Hidden Rortkit

June 27, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

FBI warns about expanded spider attacks on airline using social engineering

June 28, 2025

The new AI Facebook tool asks for upload your photos for plot ideas, causing privacy trouble

June 28, 2025

From the theft of the browser to the intelligence collection instrument

June 28, 2025

More than 1000 SOHO devices hacked in China associated with cyber-science associated with cyber

June 27, 2025

Posted and Pubshell Sarsware used in Tibet’s Mustang Panda attack

June 27, 2025

The Chinese Silver Fox Group uses fake web -sats to deliver Sainbox Rat and Hidden Rortkit

June 27, 2025

Business -SUCKS FOR AGENTIC AI SOC -Analytics

June 27, 2025

Transfer of person transfer is increased by threats when directed by scanning and disadvantages CVE

June 27, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

FBI warns about expanded spider attacks on airline using social engineering

June 28, 2025

The new AI Facebook tool asks for upload your photos for plot ideas, causing privacy trouble

June 28, 2025

From the theft of the browser to the intelligence collection instrument

June 28, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.