
New Microsoft 2FA Bypass Attack Warning—Dangerous And Sneaky, Act Now
A new and devastating phishing attack has been uncovered by French security researchers at Sekoia, which can bypass two-factor authentication (2FA) on Microsoft 365 accounts. Dubbed “Sneaky Log,” the attack is not only highly effective but also incredibly dangerous.
The threat is centered around a sophisticated phishing kit that can harvest Microsoft 365 session cookies to bypass the 2FA process during subsequent attacks, making it appear as though users have successfully logged in. The attackers’ goal is to obtain sensitive information and wreak havoc on compromised accounts.
According to experts, this attack is particularly treacherous because of its ability to populate victim email addresses automatically, evade detection through Cloudflare Turnstile challenges, and redirect security tools to Wikipedia pages. This level of sophistication makes it a significant concern for organizations utilizing Microsoft 365.
“This kit’s sneaky aspects include its ability to bypass one of the most relied-upon layers of account protection,” warns Patrick Tiquet, Vice President of Security and Architecture at Keeper Security. “It’s essential that users take immediate action to protect themselves.”
To mitigate this threat, experts recommend implementing Privileged Access Management to restrict access and contain potential damage from compromised accounts. Additionally, organizations should prioritize robust password management to ensure credentials are strong, unique, and securely stored.
“This attack is not limited to Microsoft 365 users,” emphasizes Tiquet. “This type of threat can impact any account that is perceived to be of high value to the attackers involved.”
The critical factor in most such attacks is the phishing aspect, which means that mitigation strategies must focus on this area. This article delves into methods for mitigating phishing attacks and provides actionable advice for users to protect themselves against these nefarious threats.
It’s imperative that Microsoft 365 users take immediate action to defend against this devastating attack.
Source: www.forbes.com