New Microsoft 365 Attack Can Break 2FA

Adding two-factor authentication (2FA) to your account security is always a good idea, but it's not insurmountable. Hackers are finding new ways to bypass these defenses and gain access to people's accounts. For example, a new phishing attack can access Microsoft 365 accounts even if the target has 2FA enabled.

Rockstar 2FA is stealing everyone's 2FA codes

New Microsoft 365 Attack Can Break 2FA Picture 1

 

The Rockstar 2FA phishing kit is a unique malicious toolkit that cybercriminals can buy on the black market for $200, Trustwave reports. It gives criminals everything they need to break into someone's Microsoft 365 account, even if they have 2FA enabled.

Here's how it works: A bad actor sends a phishing email asking the target to log in to their Microsoft 365 account. The email contains a link to a fake Microsoft 365 page, claims they've received a new document, or makes fake threats that must be resolved by accessing the account.

Typically, a phishing attack doesn't get much more complicated than this. But the Rockstar 2FA phishing kit has a trick up its sleeve: It acts as an adversary-in-the-middle (AITM). When a user enters their username and password into the fake login page, Rockstar 2FA passes the details to the legitimate Microsoft 365 login page.

Microsoft's servers verify the login process and ask Rockstar 2FA for a 2FA code. Rockstar passes this request on to the user, who completes the login process. Rockstar 2FA then steals the session cookie for the transaction, allowing the hacker to access the victim's account.

How to stay safe from Rockstar 2FA

Fortunately, while Rockstar 2FA is dangerous, it still relies on traditional phishing tactics to steal your account, so if you take the time to learn what phishing is and how to avoid it, you can avoid this dangerous attack.

4 ★ | 2 Vote

May be interested

  • Microsoft confirmed it was hit by a DDoS attackMicrosoft confirmed it was hit by a DDoS attack
    microsoft confirmed that a nearly 10-hour service interruption that prevented users from accessing some microsoft services on july 30 was due to a denial of service (ddos) attack.
  • Microsoft revealed the 'system crash' incident in early June was caused by a DDoS attackMicrosoft revealed the 'system crash' incident in early June was caused by a DDoS attack
    during the first week of june, microsoft unexpectedly experienced a severe outage affecting most of its services including azure, outlook, and teams.
  • The attack on Microsoft Exchange increased while WannaCry showed signs of returnThe attack on Microsoft Exchange increased while WannaCry showed signs of return
    the series of security flaws that have existed for a long time in microsoft exchange and have only recently been patched have attracted a lot of attention from both users and cybercriminals.
  • Analysis of an attack (Part 3)Analysis of an attack (Part 3)
    in part 2 of this series, we have left all the necessary information required for an attack on the victim network. with that note, let's continue with a real attack. this attack follows the transmission of ecommerce
  • Vista suffered the first attackVista suffered the first attack
    just a week after the launch of microsoft windows vista suffered the first attack by hackers. however, vista is just a victim of abuse in this attack, not a target.
  • Change the Section Break in Word 2007 and 2010Change the Section Break in Word 2007 and 2010
    when you want to change section break type in a word text, or simply manage the section better, change or reformat from the beginning ... how will you do it? maybe many people will think that the simple method is to delete that section, insert it to change the format ...
  • Microsoft was attacked by Syrian Electronic ArmMicrosoft was attacked by Syrian Electronic Arm
    the syrian electronic army hackers team (sea) promised that they would continue to attack microsoft, and today the team hacked the official microsoft office blog just hours after the web was applied to the new interface.
  • What is Smurf Attack? How to prevent Smurf Attack?What is Smurf Attack? How to prevent Smurf Attack?
    smurf attack is a type of ddos attack, hackers will attack the victim's server by sending fake ip requests using internet control message protocol to create fake accesses that overload the target device or network.
  • Trojans appear to attack Microsoft OfficeTrojans appear to attack Microsoft Office
    security experts have warned of a new trojan that appears to be able to attack an unpatched microsoft office security vulnerability that could allow hackers to hack into computers.
  • How to Break a ChainHow to Break a Chain
    whether you own a bike or simply work with chains a lot, there will probably come a time at some point where you'll need to break a chain in order to remove and repair it. if you're trying to break a bike chain, you may need to use pliers...