Sunday, April 6, 2025
Homecyber securityAstaroth 2FA Phishing Kit Targets Gmail, Yahoo, Office 365, and Third-Party Logins

Astaroth 2FA Phishing Kit Targets Gmail, Yahoo, Office 365, and Third-Party Logins

Published on

SIEM as a Service

Follow Us on Google News

A new phishing kit named Astaroth has emerged as a significant threat in the cybersecurity landscape by bypassing two-factor authentication (2FA) mechanisms.

First advertised on cybercrime networks in January 2025, Astaroth employs advanced techniques such as session hijacking and real-time credential interception to compromise accounts on platforms like Gmail, Yahoo, Office 365, and other third-party logins.

Advanced Techniques for Bypassing 2FA

Unlike traditional phishing kits that rely on static fake login pages to collect credentials, Astaroth uses an evilginx-style reverse proxy to dynamically intercept authentication data in real-time.

- Advertisement - Google News

Acting as a man-in-the-middle, the kit mirrors legitimate login pages, complete with SSL certificates, ensuring victims perceive no security warnings.

When users enter their credentials and 2FA tokens on these spoofed pages, Astaroth intercepts the data before forwarding it to the legitimate server.

According to SlashNext, the phishing kit captures not only usernames and passwords but also session cookies and 2FA tokens (e.g., SMS codes or app-generated codes).

These session cookies allow attackers to bypass authentication entirely by injecting them into their browsers, effectively impersonating the victim without requiring additional credentials.

Real-time alerts via a web panel or Telegram notifications enable attackers to act immediately after capturing the data.

Astaroth
The attacker’s web panel that stores session information

Key Features and Distribution

Astaroth is sold for $2,000 on cybercrime forums and Telegram channels, offering six months of updates and support.

It includes features such as:

  • Real-time credential capture: Intercepts usernames, passwords, 2FA tokens, and session cookies.
  • SSL-certified phishing domains: Ensures victims see no security warnings.
  • Bulletproof hosting: Resists takedown attempts by law enforcement by operating in jurisdictions with limited regulatory oversight.
  • Bypass techniques: Includes methods to evade reCAPTCHA and BotGuard protections.

The phishing kit is marketed with transparency and even offers testing before purchase to demonstrate its capabilities.

This openness attracts both experienced cybercriminals and newcomers.

Astaroth’s sophistication highlights the growing challenges of defending against phishing attacks.

By targeting 2FA mechanisms considered a robust layer of security, it renders traditional defenses ineffective.

The kit’s ability to hijack authenticated sessions in real-time poses a severe risk to individuals and organizations alike.

Experts emphasize the need for enhanced cybersecurity measures.

Real-time threat detection across web, email, and mobile channels is critical.

Additionally, educating users to recognize phishing attempts remains essential.

For instance, users should avoid clicking on suspicious links in emails and instead navigate directly to official websites to verify account activity.

As phishing kits like Astaroth become more accessible and sophisticated, they lower the barrier for cybercriminals to execute highly effective attacks.

This underscores the importance of adopting proactive security strategies to mitigate evolving threats.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Hack The box “Ghost” Challenge Cracked – A Detailed Technical Exploit

Cybersecurity researcher "0xdf" has cracked the "Ghost" challenge on Hack The Box (HTB), a...

Sec-Gemini v1 – Google’s New AI Model for Cybersecurity Threat Intelligence

Google has unveiled Sec-Gemini v1, an AI model designed to redefine cybersecurity operations by...

U.S. Secures Extradition of Rydox Cybercrime Marketplace Admins from Kosovo in Major International Operation

The United States has successfully extradited two Kosovo nationals, Ardit Kutleshi, 26, and Jetmir...

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hack The box “Ghost” Challenge Cracked – A Detailed Technical Exploit

Cybersecurity researcher "0xdf" has cracked the "Ghost" challenge on Hack The Box (HTB), a...

Sec-Gemini v1 – Google’s New AI Model for Cybersecurity Threat Intelligence

Google has unveiled Sec-Gemini v1, an AI model designed to redefine cybersecurity operations by...

U.S. Secures Extradition of Rydox Cybercrime Marketplace Admins from Kosovo in Major International Operation

The United States has successfully extradited two Kosovo nationals, Ardit Kutleshi, 26, and Jetmir...