Saturday, February 8, 2025
HomeHacksTelegram Bot Selling Phishing Tools to Bypass 2FA & Hack Microsoft 365...

Telegram Bot Selling Phishing Tools to Bypass 2FA & Hack Microsoft 365 Accounts

Published on

SIEM as a Service

Follow Us on Google News

A newly discovered phishing marketplace, ONNX Store, empowers cybercriminals to launch sophisticated attacks against Microsoft 365 and Office 365 environments. The platform provides tools to circumvent robust 2FA safeguards, enabling threat actors to compromise accounts with increased efficiency. 

Corporate security teams must prioritize anti-phishing defenses to mitigate the risk of successful attacks, data breaches, and financial loss resulting from this advanced threat. 

Cybercriminals are leveraging ONNX Store phishing tools to target financial institutions. The attack vector involves deceptive emails disguised as HR communications about remuneration, enticing victims to open attached PDFs containing malicious QR codes. 

Scanning these codes redirects users to phishing sites designed to mimic legitimate login pages, enabling attackers to steal credentials and bypass 2FA, granting unauthorized access to sensitive systems. 

The fake Microsoft login page prompts victims to enter their credentials and a one-time 2FA code.

A phishing attack leverages email with a PDF attachment containing a QR code, enticing victims to scan it for supposed “vital salary information,” which redirects users to a fraudulent Microsoft 365 login page designed to harvest credentials and 2FA codes. 

Are you from SOC and DFIR Teams? Analyse Malware Incidents & get live Access with ANY.RUN -> Get 14 Days Free Access

By targeting personal smartphones, the attack circumvents potential corporate anti-phishing defenses, increasing the likelihood of successful credential theft. 

The attacks leverage WebSocket’s real-time communication to rapidly exfiltrate stolen credentials and one-time 2FA codes, while attackers embed phishing kits within malicious emails to deceive victims into revealing sensitive information. 

According to Kaspersky, upon successful credential capture, the WebSocket protocol swiftly transmits the data to the attacker’s infrastructure. 

With immediate access to both credentials and a valid 2FA code, attackers can promptly infiltrate victim accounts, compromising email correspondence and enabling subsequent attacks like Business Email Compromise (BEC). 

ONNX Store operates a phishing-as-a-service platform centered on Telegram, employing bots to automate all user interactions. 

This infrastructure leverages Telegram as a command-and-control hub for phishing campaigns, streamlining the distribution of phishing kits and the management of compromised accounts through automated processes. 

Cybercriminals can now outsource phishing attacks by subscribing to specialized services, which offer a range of tools and infrastructure for crafting and executing phishing campaigns at low costs. 

Subscribers gain access to pre-engineered phishing kits targeting specific platforms like Microsoft 365, including options to bypass two-factor authentication, which lowers the barrier of entry for cybercriminals, enabling even low-level actors to launch sophisticated attacks and monetize stolen credentials. 

To mitigate advanced phishing risks, implement FIDO U2F hardware tokens or passkeys for robust 2FA, deploy comprehensive security solutions with anti-phishing capabilities across all devices, and conduct regular, interactive security awareness training to enhance employee vigilance against sophisticated phishing tactics. 

Download Free Cybersecurity Planning Checklist for SME Leaders (PDF) – Free Download

Kaaviya
Kaaviya
Kaaviya is a Security Editor and fellow reporter with Cyber Security News. She is covering various cyber security incidents happening in the Cyber Space.

Latest articles

UK Pressures Apple to Create Global Backdoor To Spy on Encrypted iCloud Access

United Kingdom has reportedly ordered Apple to create a backdoor allowing access to all...

Autonomous LLMs Reshaping Pen Testing: Real-World AD Breaches and the Future of Cybersecurity

Large Language Models (LLMs) are transforming penetration testing (pen testing), leveraging their advanced reasoning...

Securing GAI-Driven Semantic Communications: A Novel Defense Against Backdoor Attacks

Semantic communication systems, powered by Generative AI (GAI), are transforming the way information is...

Cybercriminals Target IIS Servers to Spread BadIIS Malware

A recent wave of cyberattacks has revealed the exploitation of Microsoft Internet Information Services...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Autonomous LLMs Reshaping Pen Testing: Real-World AD Breaches and the Future of Cybersecurity

Large Language Models (LLMs) are transforming penetration testing (pen testing), leveraging their advanced reasoning...

Zero-Day Vulnerabilities in Microsoft Sysinternals Tools Enable DLL Injection Attacks on Windows

A significant zero-day vulnerability has been uncovered in Microsoft Sysinternals tools, posing a severe...

Chinese CDN Exploiting AWS & Microsoft Cloud to Host Malicious Websites

A recent investigation by cybersecurity firm Silent Push has revealed how a China-linked Content...