Over 1200 Man-in-the-Middle Phishing Toolkits Designed to Intercept 2FA Found in the Wild

Stu Sjouwerman | Jan 6, 2022

Phishing Toolkits Design to Intercept 2FAAn academic partnership between Stony Brook University and Palo Alto Networks uncovered a massive use of tools that will steal authentication cookies mid-stream instead of credentials.

The primary benefit of having two or more authentication factors is that threat actors who only have access to your credentials don’t have everything needed to get logged in as their victim, let alone stay logged in.

But new research from Palo Atlo Networks, reported by The Record, found that threat actors are shifting from the historical methods of bypassing 2FA. Traditionally, real-time phishing attacks were used to either infect a victim computer to steal authentication-related cookies post-authentication or to trick the user into giving up credentials – including SMS-based second-factor authentication details – to log onto a target application.

The new research shows threat actors moving towards a method that is much cleaner and less prone to being discovered - Man-in-the-Middle (MitM) Phishing. With MitM phishing, the cybercriminals insert a reverse proxy in between the victim and the desired application. When the user logs on, instead of stealing the credential and second factor to gain one-time access, the authentication cookie(s) transmitted by the authenticating service are captured.

With the cookies in hand, threat actors can establish a post-authentication session with a web application, making the application act as if the malicious session is legitimate and authenticated.

This is nasty stuff.

You’ll continue to hear headlines that only mention the target platform (e.g., Microsoft 365) and something like “stealing credentials”, but this extra bit of context around exactly how this is accomplished above should have your attention; with 2FA cookies in place, a threat actor has repeat access to a platform like Microsoft 365 instead of just a single session.

In the end, threat actors still need to use phishing and social engineering tactics to trick users into clicking on a link that ultimately points to the target web application. So, by putting users through Security Awareness Training, it’s possible to lessen the risk that this kind of attack will be successful.

Discover Your Organization’s Phish-prone™ Percentage

Ninety-one percent of data breaches begin with spear phishing. Launch our Free Phishing Security Test for up to 100 users to uncover your team's vulnerability and see how your security posture stacks up against industry benchmarks.

Get Your Free Phishing Security Test

Secure the Digital Workforce: Human + AI

KnowBe4 empowers the modern workforce to make smarter security decisions every day. Trusted by more than 70,000 organizations worldwide, KnowBe4 is the pioneer of digital workforce security, securing both AI agents and humans. The KnowBe4 Platform provides attack simulation and training, collaboration security, and agent security powered by AIDA (Artificial Intelligence Defense Agents) and a proprietary Risk Score. The platform leverages 15 years of behavioral data to combat advanced threats including social engineering, prompt injection, and shadow AI. By securing humans and agents, KnowBe4 leads the industry in workforce trust and defense.