New Sneaky 2FA Code Bypass Attack Targets Microsoft Users

Forbes - Jan 18th, 2025
Open on Forbes

French security researchers have raised alarms over a new phishing threat targeting Microsoft 365 users. This threat involves a phishing-as-a-service kit known as Sneaky 2FA, sold by a cybercrime group named Sneaky Log. The kit, which costs $200 per month, employs a bot service via Telegram to execute adversary-in-the-middle attacks, stealing credentials and bypassing two-factor authentication (2FA) protections. The attack relies on harvesting session cookies to make authentication attempts appear legitimate. The phishing pages are hosted on compromised infrastructure, often involving WordPress sites. The sophistication of the kit includes automatic population of victim email addresses, evasion of detection, and clever redirection tactics.

The implications of this attack are significant as it demonstrates the evolving capabilities of cybercriminals to bypass security measures like 2FA, which are widely considered strong defenses against unauthorized access. Security experts emphasize that while this attack currently targets Microsoft 365 users, similar strategies could affect any high-value accounts. This underscores the critical need for robust phishing mitigation strategies to protect users and organizations from these increasingly sophisticated threats. Researchers are urging affected users to be vigilant and implement additional security measures to safeguard their accounts.

Story submitted by Fairstory

RATING

6.6
Fair Story
Consider it well-founded

Overall, the news story effectively highlights a significant cybersecurity threat posed by the Sneaky 2FA kit. It provides a clear and coherent narrative that explains the technical aspects of the attack in an accessible manner. The story's accuracy is bolstered by credible sources, although it would benefit from a broader range of perspectives and more detailed verification of certain technical claims. The balance of the story leans towards highlighting the vulnerability, with less emphasis on mitigation strategies or defensive measures, which could provide a more rounded view.

The source quality is robust, drawing on reputable cybersecurity experts and firms, but could be enhanced by incorporating statements from affected companies or additional independent experts. Transparency is an area for improvement, as the story could offer more insights into the research methodologies and potential biases, helping readers assess the reliability of the findings. The clarity of the writing is commendable, though some technical explanations could be expanded for greater reader comprehension.

In summary, while the story offers valuable insights into a pressing cybersecurity issue, it could be strengthened by including a wider range of sources, more balanced perspectives, and enhanced transparency regarding the research and reporting process. This would provide a richer, more comprehensive understanding of the threat landscape and the measures users can take to protect themselves.

RATING DETAILS

7
Accuracy

The news story provides an accurate overview of the threat posed by the Sneaky 2FA phishing-as-a-service kit. The description aligns with known methods used in adversary-in-the-middle (AiTM) attacks, which are confirmed by reports from reputable sources like Sekoia. The story correctly identifies the core threat of session cookie theft to bypass 2FA protections, a tactic used in similar phishing attacks. However, the analysis reveals some inaccuracies; for example, the story implies a broader application of this specific kit than what is confirmed by existing reports. While it mentions the involvement of compromised WordPress sites, it lacks detailed verification of how widespread this practice is. Moreover, some technical claims, such as the effectiveness of the obfuscation techniques or the specific methods used to evade detection, would benefit from additional corroboration with technical documentation or detailed case studies. Overall, while the story captures the essence of the threat, it could be more precise in detailing the technical aspects and scope of the attack.

6
Balance

The news story predominantly focuses on the threat posed by the Sneaky 2FA kit, providing a detailed account of its capabilities and the potential impacts on Microsoft 365 users. However, the article could be criticized for not sufficiently representing defensive perspectives or mitigation strategies beyond a brief mention. While it does acknowledge the broader applicability of such attacks to other high-value targets, it lacks input from affected parties or independent cybersecurity experts who could provide a counterbalance to the narrative of vulnerability. Additionally, the story mentions reaching out to Microsoft for a statement but does not include any response, which might have provided a more balanced view. Including perspectives from cybersecurity firms on effective countermeasures or recent advancements in 2FA security would have enriched the story's balance, offering readers a fuller picture of the current security landscape.

8
Clarity

The news story is generally clear and well-structured, providing a straightforward account of the phishing threat targeting Microsoft 365 users. The language is accessible, with technical jargon explained sufficiently for a general audience. The narrative flows logically, beginning with an introduction to the threat and progressing through detailed descriptions of the attack's mechanics and potential impacts. However, some sections could benefit from additional clarity, particularly where technical details are condensed or assumed to be understood. For instance, the explanation of session cookie theft could be expanded to elucidate its significance in bypassing 2FA protections for less technically savvy readers. Additionally, while the tone is mostly neutral, the story could avoid sensational language in describing the threat to maintain a consistently professional tone. Overall, the clarity is strong, with room for minor improvements in technical elucidation and tone consistency.

7
Source quality

The primary source of information appears to be the French cybersecurity company Sekoia, which lends credibility to the technical aspects of the story. Sekoia's reputation in the cybersecurity community supports the reliability of the findings presented. Additionally, comments from experts like Elad Luz and Stephen Kowski add depth to the story, reinforcing its authority with insights from professionals in the field. However, the story could benefit from a broader range of sources to enhance its reliability further. Including official statements from Microsoft or other cybersecurity entities would provide additional validation and breadth to the claims made. The story's reliance on a limited number of primary sources may limit its scope and depth, suggesting a need for more comprehensive source engagement to bolster the narrative's overall reliability.

5
Transparency

The transparency of the news story is somewhat limited. While it effectively outlines the capabilities of the Sneaky 2FA kit and the general nature of the attack, it lacks detailed disclosure about the methodologies used in the report or the extent of the threat's impact. The mention of reaching out to Microsoft for a comment is a positive aspect, although the absence of a response or acknowledgment reduces the transparency of the story's coverage. Furthermore, the article does not adequately discuss the potential limitations or uncertainties of the findings presented, such as the geographical scope of the attack or the number of users potentially affected. A more thorough explanation of the research methods employed by Sekoia, as well as any affiliations or potential biases, would enhance the story's transparency, providing readers with a clearer understanding of the basis for its claims.

Sources

  1. https://www.trio.so/blog/microsoft-2fa-bypass-attack/
  2. https://zitadel.com/blog/2fa-bypass-attacks
  3. https://www.bleepingcomputer.com/news/security/new-rockstar-2fa-phishing-service-targets-microsoft-365-accounts/
  4. https://answers.microsoft.com/en-us/msoffice/forum/all/2fa-authentication-scam/fd109fe3-aef9-45bd-833d-7d0c157a5a88
  5. https://thehackernews.com/2024/12/microsoft-mfa-authquake-flaw-enabled.html