Security researchers have uncovered a new and sophisticated threat to Microsoft Office 365 users: a phishing-as-a-service toolkit dubbed “SessionShark O365 2FA/MFA.”
Promoted through cybercriminal marketplaces, SessionShark is designed to bypass Microsoft’s multi-factor authentication (MFA) protections—an alarming escalation in the ongoing battle between defenders and cyber attackers.
A Toolkit Purpose-Built to Evade 2FA and MFA
According to SlashNext, SessionShark operates as an adversary-in-the-middle (AiTM) attack platform, targeting Office 365 logins. Its core feature is the interception of user session cookies—the tokens that prove a user’s successful MFA login.

By stealing these tokens, attackers can hijack authenticated sessions, rendering MFA useless even if the original credentials and code have already been provided by the victim.
This mirrors tactics seen in other advanced phishing kits, such as Tycoon 2FA, elevating the potential for widescale breaches.

Clever Stealth and Anti-Detection Features
SessionShark’s promotional materials boast a comprehensive array of anti-detection technologies:
- Advanced Antibot Technology: The toolkit uses human verification, like CAPTCHAs, to block web crawlers, automated security scanners, or sandboxes. This clever filtering ensures phishing pages are primarily exposed to real users, not security researchers, reducing the chance of detection and takedown.
- Cloudflare Compatibility: The kit is optimized for deployment behind Cloudflare’s network. This not only obscures the actual hosting server but also thwarts IP-based blocking, a popular defense tactic. Using Cloudflare as a proxy, SessionShark lowers technical barriers for attackers seeking stealth and resilience.
- Enhanced Stealth Capabilities: Developers have implemented techniques such as custom HTTP headers and evasive scripting to evade detection from threat intelligence and anti-phishing services. Additionally, SessionShark can block known threat intelligence crawlers and manipulate page content dynamically for further obfuscation.
- Highly Realistic Office 365 Login Pages: The phishing interfaces mimic Microsoft’s login workflows with alarming accuracy, dynamically adapting to different devices and error scenarios. This makes detection by end-users increasingly difficult, even for those who are security savvy.
- Instant Session Logging via Telegram: The toolkit integrates with Telegram, delivering stolen credentials and session tokens to attackers in real time. This instant notification enables rapid account takeovers, frequently outpacing traditional corporate incident response.
In a tactic borrowed from legitimate SaaS models, SessionShark is marketed with polished subscription packages and supposed “educational” intentions, offering customer support via Telegram.

While the developers emphasize “for ethical hacking” and “educational purposes,” all signs point to a tool built for criminal abuse.
The emergence of SessionShark underscores a dangerous trend: As phishing kits become more advanced and accessible, even organizations with strong MFA adoption face new risks.
Security teams are urged to monitor for session anomalies, educate users about phishing techniques, and consider layered defenses beyond MFA to stay ahead of evolving threats.
Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!