bitcoin
bitcoin

$98307.52 USD 

-0.29%

ethereum
ethereum

$3420.96 USD 

2.17%

tether
tether

$1.00 USD 

0.03%

solana
solana

$256.74 USD 

-1.57%

bnb
bnb

$666.18 USD 

2.89%

xrp
xrp

$1.47 USD 

-4.74%

dogecoin
dogecoin

$0.438353 USD 

-4.72%

usd-coin
usd-coin

$0.999975 USD 

0.00%

cardano
cardano

$1.07 USD 

-1.48%

tron
tron

$0.215222 USD 

3.45%

stellar
stellar

$0.588276 USD 

37.67%

avalanche
avalanche

$42.76 USD 

-3.09%

toncoin
toncoin

$6.49 USD 

16.85%

shiba-inu
shiba-inu

$0.000027 USD 

-0.43%

polkadot-new
polkadot-new

$9.19 USD 

23.11%

Cryptocurrency News Articles

Mamba 2FA Phishing Platform Targets Microsoft 365 Accounts in AiTM Intrusions

Oct 09, 2024 at 09:55 pm

Threat actors have been using the newly emergent Mamba 2FA phishing-as-a-service platform to compromise Microsoft 365 accounts in adversary-in-the-middle intrusions

Mamba 2FA Phishing Platform Targets Microsoft 365 Accounts in AiTM Intrusions

Threat actors are now using the Mamba 2FA phishing-as-a-service platform to compromise Microsoft 365 accounts in adversary-in-the-middle (AiTM) attacks, BleepingComputer reports. Mamba 2FA's AiTM attacks against Microsoft 365 accounts are enabled by proxy relays and the Socket.IO JavaScript library, which allows for one-time passcode and authentication cookie access and communications between Microsoft 365 service phishing pages and relay servers, respectively, according to a report from Sekoia. The attackers then use a Telegram bot to enable transmission of stolen credentials and authentication cookies, Sekoia researchers found. They also noted improvements in Mamba 2FA since it was first reported by Any.Run in June. These enhancements include Mamba 2FA's use of IPRoyal proxy servers, regularly rotated phishing URLs, and benign content on HTML attachments to better conceal malicious activity. The findings should prompt organizations to bolster their defenses against AiTM intrusions launched by PhaaS operations by implementing certificate-based authentication, geo-blocking, hardware security keys, device allowlisting, IP allowlisting, and reduced token lifespans.

News source:www.scworld.com

Disclaimer:info@kdj.com

The information provided is not trading advice. kdj.com does not assume any responsibility for any investments made based on the information provided in this article. Cryptocurrencies are highly volatile and it is highly recommended that you invest with caution after thorough research!

If you believe that the content used on this website infringes your copyright, please contact us immediately (info@kdj.com) and we will delete it promptly.

Other articles published on Nov 24, 2024