Attackers Bypass MFA With New Phishing Method

Share post:

Attackers now use remote code access software and browsers to bypass multi-factor authentication (MFA).

The new method was revealed by security researcher “mr.d0x.” While performing penetration tests for a phishing attack, mr.d0x used the Evilginx2 attack framework.

The framework acts as a reverse proxy to steal login credentials and MFA codes, but Google’s new security feature prevented login once reverse proxies or man-in-the-middle (MiTM) were detected.

To bypass Google’s security update, mr.d0x implemented a new phishing method using noVNC remote access software and browser.

In kiosk mode, the remote software displays e-mail login prompts that run on the attacker’s server but are displayed in the victim’s browser.

In his explanation of how noVNC can be used to steal credentials, mr.d0x pointed out that attackers: “Need to setup a server with noVNC, run Firefox or another browser in kiosk mode and go to the website that the user wants to authenticate at e.g. google.com. Send the link to the target user, and when the user clicks the URL, they access the VNC session without noticing, and because you have already set up Firefox in kiosk mode, the user will only see a web page as expected.”

For more information, read the original story in BleepingComputer.

Featured Tech Jobs

SUBSCRIBE NOW

Related articles

Leaked documents may show the inside of China’s hacking strategy

Documents apparently stolen by disgruntled employees to embarrass their firm may give insight into China's cyber

Abuse of valid accounts by threat actors hits a high, says IBM

Attackers are finding that obtaining valid credentials is an easier route to achieving their goals, s

Cyber Security Today, Feb. 21, 2024 – A patch warning from ConnectWise, the latest ransomware news, and more

This episode reports on a report comparing business email compromise attacks against ransomware

UK leads takedown of LockBit ransomware gang’s website

The LockBit ransomware gang’s website has been seized, several news agencies reported late Monday. The Reuters news agency and The Register are carrying stories based on a new splash screen that has appeared on the gang’s website. It says, “This site is now under the control of the National Crime Agency of the UK, working

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways