Tuesday, March 25, 2025
HomeCyber AttackHackers Exploit Advanced MFA Bypass Techniques to Compromise User Accounts

Hackers Exploit Advanced MFA Bypass Techniques to Compromise User Accounts

Published on

SIEM as a Service

Follow Us on Google News

In recent years, phishing has remained the most prevalent form of cyberattack, with approximately 1.2% of global email traffic being phishing attempts, amounting to about 3.4 billion emails daily.

Despite a low success rate, with only 3% of employees clicking on malicious links, the consequences can be disastrous for organizations.

Phishing continues to be a favorite initial access vector for threat actors due to its ease and effectiveness.

Advanced Phishing Techniques

Modern phishing campaigns have evolved significantly, incorporating sophisticated techniques to bypass multi-factor authentication (MFA) and capture user credentials.

One such method is the “Browser-in-the-Browser” (BITB) attack, introduced by security researcher mr.d0x in 2022.

This technique involves creating a fake browser window that mimics legitimate authentication processes, making it difficult for users to verify the URL’s authenticity.

By using HTML, CSS, and JavaScript, phishers can create a convincing login experience that appears to be from a trusted third-party authenticator like Google or Microsoft.

Another advanced technique is the “Adversary-in-the-Middle” (AITM) approach, which uses reverse proxy tools like Evilginx to capture not only credentials but also sessions, effectively bypassing MFA.

MFA Bypass
Transparent phishing with a reverse proxy 

According to QuarksLab Report, this method allows phishers to intercept and modify traffic between the victim and the legitimate website, making it nearly undetectable.

Evilginx enables the creation of “phishlets,” which are configuration files that define how the reverse proxy should behave for specific targets, allowing for customized phishing attacks.

Hybrid and Heavy Techniques

Hybrid techniques, such as “Frameless BITB,” combine the BITB method with real proxified authentication pages, enhancing the legitimacy of the phishing site.

This approach uses CSS to replace elements of the original authentication page, eliminating the need for iframes and making it harder to detect.

Heavy techniques, like using noVNC or WebRTC, involve hosting a browser in kiosk mode and controlling it remotely, allowing phishers to bypass 2FA by reusing the browser’s session.

MFA Bypass
CuddlePhish admin panel

Tools like EvilnoVNC and CuddlePhish facilitate these attacks by sandboxing the browser and streaming its output, giving phishers full control over the user’s interaction.

These advanced methods highlight the evolving sophistication of phishing attacks and the need for robust security measures to protect user accounts.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free. 

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

New Malware Targets Android Users by Abusing Cross-Platform Framework for Evasion

A recent discovery by the McAfee Mobile Research Team has highlighted a new wave...

ARMO Unveils First Cloud App Detection & Response Solution for Seamless Code-to-Cloud Security

Tel Aviv, Israel, March 25th, 2025, CyberNewsWireARMO CADR minimizes the cloud attack surface, detects and...

Gartner Names CYREBRO in Emerging Tech Report for Detection & Response Startups

Ramat Gan, Israel, March 25th, 2025, CyberNewsWireCYREBRO, the AI-native Managed Detection and Response (MDR),...

Active Roles Secures 2025 Cybersecurity Excellence Award for Hybrid AD Protection

Alisa Viejo, United States, March 25th, 2025, CyberNewsWireOne Identity, a leader in unified identity...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

New Malware Targets Android Users by Abusing Cross-Platform Framework for Evasion

A recent discovery by the McAfee Mobile Research Team has highlighted a new wave...

Gartner Names CYREBRO in Emerging Tech Report for Detection & Response Startups

Ramat Gan, Israel, March 25th, 2025, CyberNewsWireCYREBRO, the AI-native Managed Detection and Response (MDR),...

New Specter Insight C2 Tool Fuels ClickFix-Based Hacking Campaigns

A recent cybersecurity investigation has uncovered a previously unidentified Command and Control (C2) framework,...