Software for sale is fueling a torrent of phishing attacks that bypass MFA

March 14, 2023:

Software for sale is fueling a torrent of phishing attacks that bypass MFA

Getty Images

Microsoft on Tuesday profiled software for sale in online forums that makes it easy for criminals to deploy phishing campaigns that successfully compromise accounts, even when they’re protected by the most common form of multi-factor authentication.

The phishing kit is the engine that’s powering more than 1 million malicious emails each day, researchers with the Microsoft Threat Intelligence team said. The software, which sells for $300 for a standard version and $1,000 for VIP users, offers a variety of advanced features for streamlining the deployment of phishing campaigns and increasing their chances of bypassing anti-phishing defenses.

One of the most salient features is the built-in ability to bypass some forms of multi-factor authentication. Also known as MFA, two-factor authentication, or 2FA, this protection requires account holders to prove their identity not only with a password but also by using something only they own (such as a security key or authenticator app) or something only they are (such as a fingerprint or facial scan). MFA has become a major defense against account takeovers because the theft of a password alone isn’t sufficient for an attacker to gain control.

MFA’s Achilles’ heel: TOTPs

The effectiveness of MFA hasn’t gone unnoticed by phishers. Several campaigns that have come to light in recent months have underscored the vulnerability of MFA systems that use TOTPs, short for time-based one-time passwords, which are generated by authenticator apps. One campaign uncovered by Microsoft targeted more than 10,000 organizations over a 10-month span. The other successfully breached the network of security firm Twilio.
Like the phishing kit Microsoft detailed on Tuesday, the two campaigns above used a technique known as AitM, short for adversary in the middle. It works by placing a phishing site between the targeted user and the site the user is trying to log in to. When the user enters the password into the fake site, the fake site relays it to the real site in real time. If the real site responds with a prompt for a TOTP, the fake site receives the prompt and passes it back to the target, also in real time. When the target enters the TOTP into the fake site, the fake site sends it to the real site.

Diagram showing how AitM defeats TOTP-based MFA.
Enlarge / Diagram showing how AitM defeats TOTP-based MFA.

Microsoft

To ensure that the TOTP is entered within the time limit (usually about 30 seconds), the phishers use bots based on Telegram or other real-time messengers that automatically enter credentials quickly. Once the process is completed, the real site sends an authentication cookie to the fake site. With that, the phishers have everything they need to take over the account.

Last May, a crime group Microsoft tracks as DEV-1101 started advertising a phishing kit that defeats not only MFA based on one-time passwords but also other automated defenses that are in wide use. One feature inserts a CAPTCHA into the process to ensure human-operated browsers can access the final phishing page but automated defenses cannot. Another feature briefly redirects the target’s browser from the initial link included in the phishing email to a benign site before arriving at the phishing site. The redirection helps defeat blocklists of known malicious URLs.

Advertisements that began appearing last May described the kit as a phishing application written in NodeJS that offers PHP reverse-proxy capabilities for bypassing MFA and CAPTCHA and redirects for bypassing other defenses. The ads promote other capabilities, such as automated setup and a wide range of pre-installed templates for mimicking services like Microsoft Office or Outlook.

“These attributes make the kit attractive to many different actors who have continually put it to use since it became available in May 2022,” Microsoft researchers wrote. “Actors using this kit have varying motivations and targeting and might target any industry or sector.”

The post went on to list several measures customers can use to counter the evasion capabilities of the kit, including Windows Defender and anti-phishing solutions. Unfortunately, the post glossed over the most effective measure, which is MFA based on the industry standard known as FIDO2. So far, there are no known credential phishing attacks that defeat FIDO2, making it among the most effective barriers to account takeovers.

For more on FIDO2-compliant MFA see previous coverage here, here, and here.

The phishing attack that breached Twilio’s network worked because one of the targeted employees entered an authenticator-generated TOTP into the attacker’s fake login site. The same campaign failed against content delivery network Cloudflare because the company used FIDO2-based MFA.

Source link