Wednesday, February 19, 2025
Homecyber securityAstaroth 2FA Phishing Kit Targets Gmail, Yahoo, Office 365, and Third-Party Logins

Astaroth 2FA Phishing Kit Targets Gmail, Yahoo, Office 365, and Third-Party Logins

Published on

SIEM as a Service

Follow Us on Google News

A new phishing kit named Astaroth has emerged as a significant threat in the cybersecurity landscape by bypassing two-factor authentication (2FA) mechanisms.

First advertised on cybercrime networks in January 2025, Astaroth employs advanced techniques such as session hijacking and real-time credential interception to compromise accounts on platforms like Gmail, Yahoo, Office 365, and other third-party logins.

Advanced Techniques for Bypassing 2FA

Unlike traditional phishing kits that rely on static fake login pages to collect credentials, Astaroth uses an evilginx-style reverse proxy to dynamically intercept authentication data in real-time.

Acting as a man-in-the-middle, the kit mirrors legitimate login pages, complete with SSL certificates, ensuring victims perceive no security warnings.

When users enter their credentials and 2FA tokens on these spoofed pages, Astaroth intercepts the data before forwarding it to the legitimate server.

According to SlashNext, the phishing kit captures not only usernames and passwords but also session cookies and 2FA tokens (e.g., SMS codes or app-generated codes).

These session cookies allow attackers to bypass authentication entirely by injecting them into their browsers, effectively impersonating the victim without requiring additional credentials.

Real-time alerts via a web panel or Telegram notifications enable attackers to act immediately after capturing the data.

Astaroth
The attacker’s web panel that stores session information

Key Features and Distribution

Astaroth is sold for $2,000 on cybercrime forums and Telegram channels, offering six months of updates and support.

It includes features such as:

  • Real-time credential capture: Intercepts usernames, passwords, 2FA tokens, and session cookies.
  • SSL-certified phishing domains: Ensures victims see no security warnings.
  • Bulletproof hosting: Resists takedown attempts by law enforcement by operating in jurisdictions with limited regulatory oversight.
  • Bypass techniques: Includes methods to evade reCAPTCHA and BotGuard protections.

The phishing kit is marketed with transparency and even offers testing before purchase to demonstrate its capabilities.

This openness attracts both experienced cybercriminals and newcomers.

Astaroth’s sophistication highlights the growing challenges of defending against phishing attacks.

By targeting 2FA mechanisms considered a robust layer of security, it renders traditional defenses ineffective.

The kit’s ability to hijack authenticated sessions in real-time poses a severe risk to individuals and organizations alike.

Experts emphasize the need for enhanced cybersecurity measures.

Real-time threat detection across web, email, and mobile channels is critical.

Additionally, educating users to recognize phishing attempts remains essential.

For instance, users should avoid clicking on suspicious links in emails and instead navigate directly to official websites to verify account activity.

As phishing kits like Astaroth become more accessible and sophisticated, they lower the barrier for cybercriminals to execute highly effective attacks.

This underscores the importance of adopting proactive security strategies to mitigate evolving threats.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Russian Government Proposes Stricter Penalties to Tackle Cybercrime

The Russian government has unveiled sweeping legislative reforms aimed at curbing cybercrime, introducing stricter...

GPT-4o Copilot Covers More Than 30 Popular Programming Languages

GitHub has launched GPT-4o Copilot, a refined code completion model now available to Visual Studio...

CISA Issues Two New ICS Advisories Addressing Exploits and Vulnerabilities

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) escalated its cybersecurity alerts on February...

Chrome Buffer Overflow Flaws Let Hackers Execute Arbitrary Code & Gain System Access

Google has rolled out an urgent security update for its Chrome browser, patching three...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Russian Government Proposes Stricter Penalties to Tackle Cybercrime

The Russian government has unveiled sweeping legislative reforms aimed at curbing cybercrime, introducing stricter...

GPT-4o Copilot Covers More Than 30 Popular Programming Languages

GitHub has launched GPT-4o Copilot, a refined code completion model now available to Visual Studio...

CISA Issues Two New ICS Advisories Addressing Exploits and Vulnerabilities

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) escalated its cybersecurity alerts on February...