Market Cap: $2.6952T 0.690%
Volume(24h): $45.7343B 3.750%
  • Market Cap: $2.6952T 0.690%
  • Volume(24h): $45.7343B 3.750%
  • Fear & Greed Index:
  • Market Cap: $2.6952T 0.690%
Cryptos
Topics
Cryptospedia
News
CryptosTopics
Videos
Top News
Cryptos
Topics
Cryptospedia
News
CryptosTopics
Videos
bitcoin
bitcoin

$85171.299126 USD

0.35%

ethereum
ethereum

$1612.789637 USD

1.03%

tether
tether

$0.999873 USD

0.02%

xrp
xrp

$2.084254 USD

0.12%

bnb
bnb

$592.810248 USD

0.23%

solana
solana

$141.017729 USD

2.10%

usd-coin
usd-coin

$0.999872 USD

0.01%

dogecoin
dogecoin

$0.158015 USD

-0.65%

tron
tron

$0.244474 USD

1.36%

cardano
cardano

$0.631781 USD

-0.24%

unus-sed-leo
unus-sed-leo

$9.321500 USD

1.05%

chainlink
chainlink

$12.957466 USD

1.77%

avalanche
avalanche

$19.895856 USD

3.15%

stellar
stellar

$0.246525 USD

1.41%

toncoin
toncoin

$2.976633 USD

-0.79%

Cryptocurrency News Articles

Mamba 2FA Phishing Platform Targets Microsoft 365 Accounts in AiTM Intrusions

Oct 09, 2024 at 09:55 pm

Threat actors have been using the newly emergent Mamba 2FA phishing-as-a-service platform to compromise Microsoft 365 accounts in adversary-in-the-middle intrusions

Mamba 2FA Phishing Platform Targets Microsoft 365 Accounts in AiTM Intrusions

Threat actors are now using the Mamba 2FA phishing-as-a-service platform to compromise Microsoft 365 accounts in adversary-in-the-middle (AiTM) attacks, BleepingComputer reports. Mamba 2FA's AiTM attacks against Microsoft 365 accounts are enabled by proxy relays and the Socket.IO JavaScript library, which allows for one-time passcode and authentication cookie access and communications between Microsoft 365 service phishing pages and relay servers, respectively, according to a report from Sekoia. The attackers then use a Telegram bot to enable transmission of stolen credentials and authentication cookies, Sekoia researchers found. They also noted improvements in Mamba 2FA since it was first reported by Any.Run in June. These enhancements include Mamba 2FA's use of IPRoyal proxy servers, regularly rotated phishing URLs, and benign content on HTML attachments to better conceal malicious activity. The findings should prompt organizations to bolster their defenses against AiTM intrusions launched by PhaaS operations by implementing certificate-based authentication, geo-blocking, hardware security keys, device allowlisting, IP allowlisting, and reduced token lifespans.

Disclaimer:info@kdj.com

The information provided is not trading advice. kdj.com does not assume any responsibility for any investments made based on the information provided in this article. Cryptocurrencies are highly volatile and it is highly recommended that you invest with caution after thorough research!

If you believe that the content used on this website infringes your copyright, please contact us immediately (info@kdj.com) and we will delete it promptly.

Other articles published on Apr 20, 2025