Hackers Seek To Bypass Multi-Factor Authentication

Share post:

Cyber security experts at Proofpoint say cybercriminals are now updating their tactics to bypass multi-factor authentication (MFA) systems.

This can be seen in the updated version of phishing kits used by attackers. Attackers can use phishing kits to take advantage of reverse proxy servers instead of relying on the creation of a target web page.

“The threat actors can just purchase space on a shared hosting server or cloud host and upload the phish kit and reverse proxy infrastructure on their own machines. Or compromise and use that host. It takes about an hour to purchase a domain, get a VPS [virtual private server], install the phish kit, web server, reverse proxy, and DNS configurations. By exploiting this situation with phishing kits, attackers can not only steal usernames and passwords, but also session cookies, enabling access to the targeted account,” said Sherrod DeGrippo, VP of threat protection and detection at Proofpoint.

The tactic is currently rare, but researchers warned that cybercriminals may eventually be forced to adapt if they work to bypass multi-factor authentication.

For more information read the original story in ZDNet.

SUBSCRIBE NOW

Related articles

Cyber Security Today, Week in Review for week ending Friday May 17, 2024

Welcome to Cyber Security Today. This is the Week in Review for the week ending Friday, May 17th,...

Cyber Security Today, May 17, 2024 – Malware hiding in Apache Tomcat servers

Malware hiding in Apache Tomcat servers, new backdoors found, and more Welcome to Cyber Security Today. It's Friday, May...

MIT students exploit blockchain vulnerability to steal 25 million dollars

Two MIT students have been implicated in a highly sophisticated cryptocurrency heist, where they reportedly exploited a vulnerability...

Cyber Security Today, May 15, 2024 – Ebury botnet still exploits Linux servers, Microsoft, SAP and Apple issue security updates

The Ebury botnet continues to exploit Linux servers, Microsoft, SAP and Apple issue security updates, and more. Welcome to...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways