Description
Rockstar 2FA is a new phishing-as-a-service (PhaaS) platform facilitating adversary-in-the-middle (AiTM) attacks to compromise Microsoft 365 accounts, bypassing multifactor authentication (MFA). This sophisticated platform, which builds on older kits like DadSec and Phoenix, exploits session cookies to gain unauthorized access to accounts, underscoring the evolution of phishing tactics and the persistent risks associated with PhaaS ecosystems.
Attack Details
Rockstar 2FA uses adversary-in-the-middle (AiTM) techniques to deceive users with fake login pages that mimic Microsoft 365, tricking victims into entering their credentials. These credentials are proxied to legitimate Microsoft servers, allowing the attacker to intercept valid session cookies and bypass multifactor authentication (MFA) to access accounts without needing additional verification. The Rockstar 2FA platform supports Microsoft 365, Hotmail, GoDaddy, and Single Sign-On (SSO) systems and employs stealth features like randomized code, Cloudflare Turnstile Captcha for bot filtering, and multiple login themes with automated branding. With over 5,000 phishing domains deployed since May 2024, attacks are distributed through malicious emails leveraging tools like QR codes, URL shorteners, and PDF attachments. The user-friendly admin panel offers real-time logs, branding customization, and API access. Phishing campaigns use lures like document-sharing prompts, IT notices, payroll alerts, and password reset requests, with the AiTM system redirecting researchers or bots to benign decoy pages, ensuring operational stealth.
Indicators of Compromise (IOCs)
Remediation
The Guyana National CIRT recommends that users and administrators review this alert and apply it where necessary.
PDF Download: New Rockstar 2FA Phishing Service Targets Microsoft 365 Accounts
References