Thursday, December 7, 2023

ReelPhish – A Real-Time Advanced Two-Factor Authentication Phishing Tool

Security Firm FireEye Released a new Phishing tool called ReelPhish to simplifies the real-time Phishing attack that is designed to be run on the attacker’s system and control it by navigating the Attacker web browser.

A phishing attack is one of the dangerous social engineering attacks that leads to capture a victim’s username and password that will be store it to an attacker machine and reuse it later.

So We can Minimize the attack possibility by using Two-Factor Authentication and multi-factor authentication.

In terms of Two Factor authentication, users can get the one time password that has been generated by a secondary device, such as a hard token that can be used for 30 to 60 seconds which can’t be reused again.

This can eliminate the risk from traditional Phishing Attack and this scenario will Protect only when attacker trying to capture the username and password combinations.

Also Read : Man in the Middle Attack with “Cain and Abel” Tool

Real-time Phishing Attacks are more Dangerous

In this case, Two Factor Authentication can be compromised by  Real-time Phishing Attacks by an interaction between the attacker and victims in real time.

According to FireEye, a phishing website that prompts a user for their one-time password in addition to their username and password. Once a user completes authentication on the phishing website, they are presented with a generic “Login Successful” page and the one-time password remains unused but captured.

Later Attacker will reuse the victim’s credentials before expiration that leads to compromise the Victim.

ReelPhish Phishing Phishing Tool Tool

To perform the social engineering Mitigation, FireEye developed a new tool called ReelPhish – that clarifying the real-time phishing technique. The primary component of the phishing tool is designed to be run on the attacker’s system.

The secondary component is the code embedded on the Phishing site will send the victims credentials to the phishing tool running on the attacker’s machine.

once it received an information then it launches an original website (Legitimate site of a phishing site that developed by attacker) and authenticates with the credentials and all the communication over an encrypted SSH tunnel.

Also Performing Social Engineering Attack, FireEye makes a copy of the real VPN portal’s HTML, JavaScript, and CSS and they use this code to create a phishing site that appears to function like the original.

Later Phishing site will be communicating with the tool that is running on the attacker machine and researchers embedded a server-side code into the phishing site for testing purpose along with SSL Tunnel.

According to FireEye, We have seen numerous variations of two-factor authentication on VPN portals. In some instances, a token is passed in a “secondary password” field of the authentication form itself. In other cases, the user must respond to a push request on a mobile phone. A user is likely to accept an incoming push request after submitting credentials if the phishing site behaved identically to the real site.

Also FireEye Testing this scenario with more advanced phishing sites that can handle multiple authentication pages and also pass information back and forth between the phishing web server and the tool running on the attacking machine.

“Configure all services protected by 2FA to minimize attacker impact if the attacker successfully bypasses the 2FA protections. it is not a perfect solution, but it does add a layer of security. 2FA is a security mechanism that may fail like any other, and organizations must be prepared to mitigate the impact of such a failure. FireEye Said.”

You can Download this Tool from FireEye GitHub Repository Here.


Latest articles

Bluetooth keystroke-injection Flaw: A Threat to Apple, Linux & Android Devices

An unauthenticated Bluetooth keystroke-injection vulnerability that affects Android, macOS, and iOS devices has been...

Atlassian Patches RCE Flaw that Affected Multiple Products

Atlassian has been discovered with four new vulnerabilities associated with Remote Code Execution in...

Reflectiz Introduces AI-powered Insights on Top of Its Smart Alerting System

Reflectiz, a cybersecurity company specializing in continuous web threat management, proudly introduces a new...

SLAM Attack Gets Root Password Hash in 30 Seconds

Spectre is a class of speculative execution vulnerabilities in microprocessors that can allow threat...

Akira Ransomware Exploiting Zero-day Flaws For Organization Network Access

The Akira ransomware group, which first appeared in March 2023, has been identified as...

Hackers Deliver AsyncRAT Through Weaponized WSF Script Files

The AsyncRAT malware, which was previously distributed through files with the .chm extension, is now being...

BlueNoroff: New Malware Attacking MacOS Users

Researchers have uncovered a new Trojan-attacking macOS user that is associated with the BlueNoroff APT...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

API Attack Simulation Webinar

Live API Attack Simulation

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked.The session will cover:an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

Related Articles