Saturday, February 22, 2025
HomeCyber CrimeFlowerStorm PaaS Platform Attacking Microsoft Users With Fake Login Pages

FlowerStorm PaaS Platform Attacking Microsoft Users With Fake Login Pages

Published on

SIEM as a Service

Follow Us on Google News

Rockstar2FA is a PaaS kit that mimics the legitimate credential-request behavior of cloud/SaaS platforms. Phishing campaigns are delivered via Telegram and use unique URLs to route users to credential-capturing counterfeit login pages. 

These pages masquerade as popular services and steal login credentials along with multifactor authentication tokens via HTTP POST requests to adversary-controlled backend servers. 

While most phishing pages use domains registered in .com, .de, .ru and .moscow, a small portion leverage Cloudflare Pages for deployment with manually created subdomain names that rely on separate backend servers for exfiltrating stolen data.   

A Rockstar2FA “decoy” page
A Rockstar2FA “decoy” page

Rockstar2FA phishing kit experienced disruption on November 11th where the decoy pages failed to redirect due to a Cloudflare 522 error.

The portal pages also malfunctioned and failed to load the counterfeit Microsoft login portal that indicating that the connection to the back-end server was severed.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Around the same time, FlowerStorm phishing activity surged, which is PaaS platform and has been active since June 2024. FlowerStorm phishing pages communicate with the backend server using a next.php file. 

An HTTP request from the FlowerStorm phishing page
An HTTP request from the FlowerStorm phishing page

The communication includes user credentials and a JWT token for session tracking, while the backend server can respond with success messages or MFA challenges. 

Some phishing pages communicate with a next.php file that is located on the same domain as the landing page, while others do not use the same structure.

FlowerStorm and Rockstar2FA phishing portals exhibit strong similarities that suggest a potential link between their developers. Both utilize similar HTML structures that include Cloudflare turnstile keys and random text in comments. 

Some features are shared between their backend communication methods, such as data exfiltration based on PHP and specific field names for email validation and login events. 

The document object model of a Rockstar2FA phishing page
The document object model of a Rockstar2FA phishing page

In many cases, the timing of their domain registrations and page detections coincides, which may indicate that they utilize a shared infrastructure or that their operations are coordinated.

FlowerStorm is a paid phishing service that leverages infrastructure and communication methods similar to the previous Rockstar2FA operation, including PHP-based communication and email validation features. 

A failed connection to a decoy page domain
A failed connection to a decoy page domain

It primarily targets organizations in the United States, Canada, and other Western countries by focusing on the service sector and reveals a preference for North American and European targets with the United States accounting for the majority of attacks.

Sophos analysis of Rockstar2FA and FlowerStorm indicates a possible shared origin due to similar kit contents and domain registration patterns. 

The diverging activity post-November 11th suggests a potential strategic shift, personnel changes, infrastructure disruption, or deliberate decoupling to evade detection.

While FlowerStorm’s rapid expansion has resulted in operational errors that allow for disruption and provide insights into their backend infrastructure.

Integrating Application Security into Your CI/CD Workflows Using Jenkins & Jira -> Free Webinar

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...

ACRStealer Malware Abuses Google Docs as C2 to Steal Login Credentials

The ACRStealer malware, an infostealer disguised as illegal software such as cracks and keygens,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...