HomeCyber BalkansSneaky 2FA Kit Targets Microsoft Accounts

Sneaky 2FA Kit Targets Microsoft Accounts

Published on

spot_img

In a recent discovery by French cybersecurity company Sekoia, a new phishing kit called Sneaky 2FA has been identified as a threat to Microsoft 365 accounts. This kit is being utilized in various phishing campaigns, with nearly 100 domains hosting related phishing pages as of January 2025. Sneaky 2FA is sold as a phishing-as-a-service through a Telegram bot named “Sneaky Log,” providing customers with an obfuscated version of the source code for independent deployment.

The primary method employed by these phishing campaigns involves sending payment receipt emails to potential victims, enticing them to open malicious PDF attachments. These attachments contain QR codes that redirect users to Sneaky 2FA’s phishing pages, which are designed to replicate legitimate Microsoft login interfaces. These fake authentication pages are hosted on compromised infrastructure, often utilizing WordPress sites and other attacker-controlled domains. To further deceive victims, the pages automatically populate the victim’s email address to enhance legitimacy and trick them into divulging their credentials.

To ensure that only targeted victims are directed to the phishing pages, Sneaky 2FA incorporates various anti-bot and anti-analysis techniques. These measures include traffic filtering, Cloudflare Turnstile challenges, and checks to detect any attempts to analyze the phishing kit using developer tools. If the victim’s IP address is associated with a cloud provider or proxy service, they are redirected to a Microsoft-related Wikipedia page instead, a strategy that has earned the kit the moniker “WikiKit.” Moreover, Sneaky 2FA requires validation of an active subscription through a central server, necessitating a valid license key for operation.

Interestingly, some of the domains used by Sneaky 2FA were previously linked to other adversary-in-the-middle (AitM) phishing kits like Evilginx2 and Greatness, indicating a potential migration of cybercriminals to this new service. Despite sharing some code similarities with the W3LL Panel phishing kit, Sneaky 2FA is distinct with its own unique functionalities. Researchers have highlighted specific behaviors of the kit, such as utilizing different User-Agent strings for authentication steps, which can aid in its detection.

The emergence of Sneaky 2FA underscores the evolving landscape of phishing attacks, showcasing cybercriminals’ adaptation to security measures and their persistence in targeting Microsoft 365 users. As organizations and individuals navigate the digital realm, staying vigilant against such sophisticated threats remains paramount for safeguarding sensitive information and preventing unauthorized access to accounts.

Source link

Latest articles

Formbook Malware Campaign Employs Various Obfuscation Techniques

Emerging Phishing Campaigns Target Organizations with Stealthy Techniques to Deliver Formbook Malware In a troubling...

Cybersecurity in the Age of AI: Bigger and Faster Threats

Spearheading Cybersecurity in the Age of AI: Insights from SecureWorld Conference At the recent SecureWorld...

Copilot und Agentforce anfällig für Prompt-Injection-Tricks

Sicherheitsforschung deckt Schwachstelle in Salesforce Agentforce auf Im Rahmen ihrer umfassenden Untersuchung haben die Sicherheitsforscher...

More like this

Formbook Malware Campaign Employs Various Obfuscation Techniques

Emerging Phishing Campaigns Target Organizations with Stealthy Techniques to Deliver Formbook Malware In a troubling...

Cybersecurity in the Age of AI: Bigger and Faster Threats

Spearheading Cybersecurity in the Age of AI: Insights from SecureWorld Conference At the recent SecureWorld...