Market Cap: $2.9628T 0.090%
Volume(24h): $86.6248B 38.780%
  • Market Cap: $2.9628T 0.090%
  • Volume(24h): $86.6248B 38.780%
  • Fear & Greed Index:
  • Market Cap: $2.9628T 0.090%
Cryptos
Topics
Cryptospedia
News
CryptosTopics
Videos
Top News
Cryptos
Topics
Cryptospedia
News
CryptosTopics
Videos
bitcoin
bitcoin

$94675.983109 USD

0.98%

ethereum
ethereum

$1799.883802 USD

1.32%

tether
tether

$1.000349 USD

0.00%

xrp
xrp

$2.286240 USD

1.42%

bnb
bnb

$605.939324 USD

0.58%

solana
solana

$147.572581 USD

0.68%

usd-coin
usd-coin

$1.000102 USD

0.00%

dogecoin
dogecoin

$0.178502 USD

0.06%

cardano
cardano

$0.703594 USD

0.65%

tron
tron

$0.247222 USD

0.89%

sui
sui

$3.545068 USD

0.32%

chainlink
chainlink

$15.007946 USD

2.13%

avalanche
avalanche

$21.798486 USD

1.30%

stellar
stellar

$0.281399 USD

-1.49%

unus-sed-leo
unus-sed-leo

$9.001853 USD

-0.83%

Cryptocurrency News Articles

Mamba 2FA Phishing Platform Targets Microsoft 365 Accounts in AiTM Intrusions

Oct 09, 2024 at 09:55 pm

Threat actors have been using the newly emergent Mamba 2FA phishing-as-a-service platform to compromise Microsoft 365 accounts in adversary-in-the-middle intrusions

Mamba 2FA Phishing Platform Targets Microsoft 365 Accounts in AiTM Intrusions

Threat actors are now using the Mamba 2FA phishing-as-a-service platform to compromise Microsoft 365 accounts in adversary-in-the-middle (AiTM) attacks, BleepingComputer reports. Mamba 2FA's AiTM attacks against Microsoft 365 accounts are enabled by proxy relays and the Socket.IO JavaScript library, which allows for one-time passcode and authentication cookie access and communications between Microsoft 365 service phishing pages and relay servers, respectively, according to a report from Sekoia. The attackers then use a Telegram bot to enable transmission of stolen credentials and authentication cookies, Sekoia researchers found. They also noted improvements in Mamba 2FA since it was first reported by Any.Run in June. These enhancements include Mamba 2FA's use of IPRoyal proxy servers, regularly rotated phishing URLs, and benign content on HTML attachments to better conceal malicious activity. The findings should prompt organizations to bolster their defenses against AiTM intrusions launched by PhaaS operations by implementing certificate-based authentication, geo-blocking, hardware security keys, device allowlisting, IP allowlisting, and reduced token lifespans.

Disclaimer:info@kdj.com

The information provided is not trading advice. kdj.com does not assume any responsibility for any investments made based on the information provided in this article. Cryptocurrencies are highly volatile and it is highly recommended that you invest with caution after thorough research!

If you believe that the content used on this website infringes your copyright, please contact us immediately (info@kdj.com) and we will delete it promptly.

Other articles published on Apr 29, 2025