Devious Phishing Tactic Circumvents MFA Using Remote Access Software

This article has been indexed from

CySecurity News – Latest Information Security and Hacking Incidents

 

As per a new phishing technique,adversaries can defeat multi-factor authentication (MFA) by having victims connect to their accounts directly on attacker-controlled servers using the VNC screen sharing system.
Bypassing multi-factor authentication (MFA) configured on the intended victim’s email accounts is one of the most difficult barriers to successful phishing attempts. Even if threat actors can persuade users to input their credentials on a phishing site, if the account is protected by MFA, completely breaching the account requires the victim’s one-time passcode. 
Phishing kits have been upgraded to employ reverse proxies or other means to obtain MFA codes from unwitting victims to get access to a target’s MFA-protected accounts. Companies, on the other hand, are becoming aware of this technique and have begun implementing security measures that prevent logins or cancel accounts when reverse proxies are found. VNC is here to help. 
Mr.d0x, a security researcher, attempted to create a phishing attack on the client’s employees to get corporate account credentials while conducting a penetration test for a customer. Mr.d0x put up a phishing assault utilising the Evilginx2 attack framework, which operates as a reverse proxy to steal credentials and MFA codes because all of the accounts were configured with MFA. 
The researcher discovered that when reverse proxies or man-in-the-middle (MiTM) attacks were detected, Goog

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

Read the original article: