Friday, April 4, 2025
HomePhishingReelPhish - A Real-Time Advanced Two-Factor Authentication Phishing Tool

ReelPhish – A Real-Time Advanced Two-Factor Authentication Phishing Tool

Published on

SIEM as a Service

Follow Us on Google News

Security Firm FireEye Released a new Phishing tool called ReelPhish to simplifies the real-time Phishing attack that is designed to be run on the attacker’s system and control it by navigating the Attacker web browser.

A phishing attack is one of the dangerous social engineering attacks that leads to capture a victim’s username and password that will be store it to an attacker machine and reuse it later.

So We can Minimize the attack possibility by using Two-Factor Authentication and multi-factor authentication.

In terms of Two Factor authentication, users can get the one time password that has been generated by a secondary device, such as a hard token that can be used for 30 to 60 seconds which can’t be reused again.

This can eliminate the risk from traditional Phishing Attack and this scenario will Protect only when attacker trying to capture the username and password combinations.

Also Read : Man in the Middle Attack with “Cain and Abel” Tool

Real-time Phishing Attacks are more Dangerous

In this case, Two Factor Authentication can be compromised by  Real-time Phishing Attacks by an interaction between the attacker and victims in real time.

According to FireEye, a phishing website that prompts a user for their one-time password in addition to their username and password. Once a user completes authentication on the phishing website, they are presented with a generic “Login Successful” page and the one-time password remains unused but captured.

Later Attacker will reuse the victim’s credentials before expiration that leads to compromise the Victim.

ReelPhish Phishing Phishing Tool Tool

To perform the social engineering Mitigation, FireEye developed a new tool called ReelPhish – that clarifying the real-time phishing technique. The primary component of the phishing tool is designed to be run on the attacker’s system.

The secondary component is the code embedded on the Phishing site will send the victims credentials to the phishing tool running on the attacker’s machine.

once it received an information then it launches an original website (Legitimate site of a phishing site that developed by attacker) and authenticates with the credentials and all the communication over an encrypted SSH tunnel.

Also Performing Social Engineering Attack, FireEye makes a copy of the real VPN portal’s HTML, JavaScript, and CSS and they use this code to create a phishing site that appears to function like the original.

Later Phishing site will be communicating with the tool that is running on the attacker machine and researchers embedded a server-side code into the phishing site for testing purpose along with SSL Tunnel.

According to FireEye, We have seen numerous variations of two-factor authentication on VPN portals. In some instances, a token is passed in a “secondary password” field of the authentication form itself. In other cases, the user must respond to a push request on a mobile phone. A user is likely to accept an incoming push request after submitting credentials if the phishing site behaved identically to the real site.

Also FireEye Testing this scenario with more advanced phishing sites that can handle multiple authentication pages and also pass information back and forth between the phishing web server and the tool running on the attacking machine.

“Configure all services protected by 2FA to minimize attacker impact if the attacker successfully bypasses the 2FA protections. it is not a perfect solution, but it does add a layer of security. 2FA is a security mechanism that may fail like any other, and organizations must be prepared to mitigate the impact of such a failure. FireEye Said.”

You can Download this Tool from FireEye GitHub Repository Here.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Halo ITSM Vulnerability Lets Attackers Inject Malicious SQL Code

A critical security flaw has been discovered in Halo ITSM, an IT support management software...

Australian Pension Funds Hacked: Members Face Financial Losses

Several of Australia’s largest superannuation funds have been targeted in a coordinated cyberattack, leading...

Frida Penetration Testing Toolkit Updated with Advanced Threat Monitoring APIs

In a significant update to the popular dynamic instrumentation toolkit Frida, developers have introduced...

OpenVPN Flaw Allows Attackers Crash Servers and Run Remote Code

OpenVPN, a widely-used open-source virtual private network (VPN) software, has recently patched a security...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

New Phishing Campaign Targets Investors to Steal Login Credentials

Symantec has recently identified a sophisticated phishing campaign targeting users of Monex Securities (マネックス証券),...

Hackers Exploit Cloudflare for Advanced Phishing Attacks

A sophisticated phishing campaign orchestrated by a Russian-speaking threat actor has been uncovered, revealing...

New Surge of IRS-Themed Attacks Targets Taxpayers’ Mobile Devices

As the U.S. tax filing deadline approaches, cybercriminals are intensifying their efforts to exploit...