Market Cap: $2.7558T -10.520%
Volume(24h): $185.1189B -1.600%
  • Market Cap: $2.7558T -10.520%
  • Volume(24h): $185.1189B -1.600%
  • Fear & Greed Index:
  • Market Cap: $2.7558T -10.520%
Cryptos
Topics
Cryptospedia
News
CryptosTopics
Videos
Top News
Cryptos
Topics
Cryptospedia
News
CryptosTopics
Videos
bitcoin
bitcoin

$91229.967283 USD

5.84%

ethereum
ethereum

$2354.581560 USD

6.04%

xrp
xrp

$2.649458 USD

15.56%

tether
tether

$0.999525 USD

0.01%

bnb
bnb

$599.418199 USD

-1.77%

solana
solana

$160.462568 USD

11.29%

usd-coin
usd-coin

$0.999978 USD

0.01%

cardano
cardano

$0.995827 USD

49.40%

dogecoin
dogecoin

$0.218105 USD

5.31%

tron
tron

$0.238864 USD

2.27%

hedera
hedera

$0.248949 USD

0.83%

chainlink
chainlink

$16.162296 USD

8.94%

stellar
stellar

$0.331779 USD

2.02%

avalanche
avalanche

$23.462916 USD

6.85%

sui
sui

$2.948878 USD

2.62%

Cryptocurrency News Articles

Mamba 2FA Phishing Platform Targets Microsoft 365 Accounts in AiTM Intrusions

Oct 09, 2024 at 09:55 pm

Threat actors have been using the newly emergent Mamba 2FA phishing-as-a-service platform to compromise Microsoft 365 accounts in adversary-in-the-middle intrusions

Mamba 2FA Phishing Platform Targets Microsoft 365 Accounts in AiTM Intrusions

Threat actors are now using the Mamba 2FA phishing-as-a-service platform to compromise Microsoft 365 accounts in adversary-in-the-middle (AiTM) attacks, BleepingComputer reports. Mamba 2FA's AiTM attacks against Microsoft 365 accounts are enabled by proxy relays and the Socket.IO JavaScript library, which allows for one-time passcode and authentication cookie access and communications between Microsoft 365 service phishing pages and relay servers, respectively, according to a report from Sekoia. The attackers then use a Telegram bot to enable transmission of stolen credentials and authentication cookies, Sekoia researchers found. They also noted improvements in Mamba 2FA since it was first reported by Any.Run in June. These enhancements include Mamba 2FA's use of IPRoyal proxy servers, regularly rotated phishing URLs, and benign content on HTML attachments to better conceal malicious activity. The findings should prompt organizations to bolster their defenses against AiTM intrusions launched by PhaaS operations by implementing certificate-based authentication, geo-blocking, hardware security keys, device allowlisting, IP allowlisting, and reduced token lifespans.

Disclaimer:info@kdj.com

The information provided is not trading advice. kdj.com does not assume any responsibility for any investments made based on the information provided in this article. Cryptocurrencies are highly volatile and it is highly recommended that you invest with caution after thorough research!

If you believe that the content used on this website infringes your copyright, please contact us immediately (info@kdj.com) and we will delete it promptly.

Other articles published on Mar 04, 2025