HomeCyber SecurityNew VoidProxy phishing service targets Microsoft 365, Google accounts

New VoidProxy phishing service targets Microsoft 365, Google accounts


New VoidProxy phishing service targets Microsoft 365, Google accounts

A newly found phishing-as-a-service (PhaaS) platform, named VoidProxy, targets Microsoft 365 and Google accounts, together with these protected by third-party single sign-on (SSO) suppliers equivalent to Okta.

The platform makes use of adversary-in-the-middle (AitM) techniques to steal credentials, multi-factor authentication (MFA) codes, and session cookies in actual time.

VoidProxy was found by Okta Risk Intelligence researchers, who describe it as scalable, evasive, and complex.

The assault begins with emails from a compromised accounts at e mail service suppliers, like Fixed Contact, Lively Marketing campaign, and NotifyVisitors, whicch embody shortened hyperlinks that ship recipients to phishing websites after a a number of redirections.

The malicious websites are hosted on disposable low-cost domains on .icu, .sbs, .cfd, .xyz, .prime, and .house, that are protected by Cloudflare to cover their actual IPs.

Guests are first served a Cloudflare CAPTCHA problem to filter out bots and enhance the sense of legitimacy, whereas a Cloudflare Employee surroundings is used to filter site visitors and cargo pages.

The Cloudflare CAPTCHA step on the malicious site
The Cloudflare CAPTCHA step on the malicious web site
Supply: Okta

Chosen targets revceive a web page that mimics a Microsoft or Google login, whereas the remaining are funneled to a generic and “Welcome” web page that presents no risk.

If credentials are typed into the phishing kind, requests are proxied by VoidProxy’s adversary-in-the-middle (AitM) to Google or Microsoft servers.

Phishing pages served by VoidProxy
Phishing pages served by VoidProxy
Supply: Okta

Federated accounts like these utilizing Okta for SSO are redirected to a second-stage phishing web page impersonating Microsoft 365 or Google SSO flows with Okta. These requests have been proxied to Okta servers.

The service’s proxy server relays site visitors between the sufferer and the professional service whereas capturing usernames, passwords, and MFA codes in transit.

When the professional service points a session cookie, VoidProxy intercepts it and creates a replica that’s made accessible to the attackers proper on the platform’s admin panel.

VoidProxy's admin panel
VoidProxy’s admin panel
Supply: Okta

Okta famous that customers who had enrolled in phishing-resistant authentications like Okta FastPass have been shielded from VoidProxy’s assault move and obtained warnings about their account being beneath assault.

The researchers suggestions embody limiting entry of delicate apps solely to managed gadgets, implementing risk-based entry controls, utilizing IP session binding for administrative apps, and forcing re-authentication for admins making an attempt delicate actions.

46% of environments had passwords cracked, almost doubling from 25% final yr.

Get the Picus Blue Report 2025 now for a complete have a look at extra findings on prevention, detection, and information exfiltration traits.

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments