Hackers Seek To Bypass Multi-Factor Authentication

Share post:

Cyber security experts at Proofpoint say cybercriminals are now updating their tactics to bypass multi-factor authentication (MFA) systems.

This can be seen in the updated version of phishing kits used by attackers. Attackers can use phishing kits to take advantage of reverse proxy servers instead of relying on the creation of a target web page.

“The threat actors can just purchase space on a shared hosting server or cloud host and upload the phish kit and reverse proxy infrastructure on their own machines. Or compromise and use that host. It takes about an hour to purchase a domain, get a VPS [virtual private server], install the phish kit, web server, reverse proxy, and DNS configurations. By exploiting this situation with phishing kits, attackers can not only steal usernames and passwords, but also session cookies, enabling access to the targeted account,” said Sherrod DeGrippo, VP of threat protection and detection at Proofpoint.

The tactic is currently rare, but researchers warned that cybercriminals may eventually be forced to adapt if they work to bypass multi-factor authentication.

For more information read the original story in ZDNet.

SUBSCRIBE NOW

Related articles

Anthropic Warns: AI “Virtual Employees” Could Pose Security Risks Within a Year

Anthropic, a leading artificial intelligence company, anticipates that AI-powered virtual employees could begin operating within corporate networks as...

Hertz Data Breach Exposes Customer Information via Supply Chain Hack

Hertz has disclosed a data breach resulting from a cyberattack on its vendor, Cleo Communications, which compromised sensitive...

Google’s New Security Feature – Automatic Reboot

Google is introducing a new security feature in its latest Android update that will automatically reboot phones and...

Cybersecurity Firm Prodaft Buys Hacker Forum Accounts to Monitor Cybercriminal Activity

Swiss cybersecurity company Prodaft has initiated a program to purchase verified and aged accounts on hacking forums, aiming...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways