Tag: 2fa
-
Tycoon 2FA: Das Phishing-Kit, das 2FA ausgehebelt hat
Um 2FA- und MFA-Verfahren zu umgehen, setzt das Kit auf einen Adversary-in-the-Middle-Ansatz (AiTM) und Reverse-Proxy-Server. Darüber werden täuschend echt nachgebaute Login-Seiten bereitgestellt, die Anmeldedaten und Sitzungscookies in Echtzeit abgreifen. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/tycoon-2fa-das-phishing-kit-das-2fa-ausgehebelt-hat/a42947/
-
The Death of Legacy MFA and What Must Rise in Its Place
Tycoon 2FA proves that the old promises of “strong MFA” came with fine print all along: when an attacker sits invisibly in the middle, your codes, pushes, and one-time passwords become their codes, pushes, and one-time passwords too. Tycoon 2FA: Industrial-Scale Phishing Comes of Age Tycoon 2FA delivers a phishing-as-a-service kit that hands even modestly..…
-
New Phishing Kit Using BitB Technique Targets Microsoft Accounts to Steal Credentials via Sneaky 2FA Attack
The cybersecurity landscape continues to evolve as threat actors deploy increasingly sophisticated phishing techniques to bypass security controls and steal user credentials. Security researchers at Push Security have recently identified a concerning development in the Phishing-as-a-Service (PhaaS) ecosystem: the Sneaky2FA phishing kit has incorporated the Browser-in-the-Browser (BitB) technique to target Microsoft account credentials with unprecedented…
-
Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar
The malware authors associated with a Phishing-as-a-Service (PhaaS) kit known as Sneaky 2FA have incorporated Browser-in-the-Browser (BitB) functionality into their arsenal, underscoring the continued evolution of such offerings and further making it easier for less-skilled threat actors to mount attacks at scale.Push Security, in a report shared with The Hacker News, said it observed the…
-
The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA
Tycoon 2FA enables turnkey real-time MFA relays behind 64,000+ attacks this year, proving legacy MFA collapses the moment a phishing kit targets it. Learn from Token Ring how biometric, phishing-proof FIDO2 hardware blocks these relay attacks before they succeed. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/the-tycoon-2fa-phishing-platform-and-the-collapse-of-legacy-mfa/
-
Tycoon 2FA and the Collapse of Legacy MFA
Tycoon 2FA enables turnkey real-time MFA relays behind 64,000+ attacks this year, proving legacy MFA collapses the moment a phishing kit targets it. Learn from Token Ring how biometric, phishing-proof FIDO2 hardware blocks these relay attacks before they succeed. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/tycoon-2fa-and-the-collapse-of-legacy-mfa/
-
Anatomy of Tycoon 2FA Phishing: Tactics Targeting M365 and Gmail
The Tycoon 2FA phishing kit represents one of the most sophisticated threats targeting enterprise environments today. This Phishing-as-a-Service (PhaaS) platform, which emerged in August 2023, has become a formidable adversary against organizational security, employing advanced evasion techniques and adversary-in-the-middle (AiTM) strategies to bypass multi-factor authentication protections. According to the Any.run malware trends tracker, Tycoon 2FA…
-
X warns users to re-enroll passkeys and YubiKeys for 2FA by Nov 10
X urges users with passkeys or YubiKeys to re-enroll 2FA by Nov 10, 2025, or risk account lockout. Re-enroll, switch 2FA, or disable it. Social media platform X is urging users who use passkeys or hardware security keys like YubiKeys for two-factor authentication (2FA) to re-enroll their keys by November 10, 2025, to keep account…
-
Re-enroll 2FA security keys by November 10 or get locked out
X is warning that users must re-enroll their security keys or passkeys for two-factor authentication (2FA) before November 10 or they will be locked out of their accounts until they do so. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/x-re-enroll-2fa-security-keys-by-november-10-or-get-locked-out/
-
X to Retire Twitter.com, Users Must Re-Register Security Keys by Nov 10
X (formerly Twitter) is asking users with security keys to re-enroll by Nov 10 as it moves logins from twitter.com to x.com for continued 2FA access. First seen on hackread.com Jump to article: hackread.com/x-retire-twitter-com-re-register-security-keys/
-
Neues, getarntes Phishing-Kit zielt auf Microsoft 365 ab
Ein neuartiges, getarntes und hartnäckiges PhaaS-Kit stiehlt Anmeldedaten und Authentifizierungs-Token von Microsoft 365-Nutzern, wie eine aktuelle Analyse von Barracuda zeigt [1]. Die Bedrohungsanalysten beobachten dieses neue und sich rasant weiterentwickelnde PhaaS-Kit seit Juli 2025 und haben es »Whisper 2FA« getauft. Im vergangenen Monat hat Barracuda fast eine Million Whisper 2FA-Angriffe auf Konten im Rahmen von……
-
Neues, getarntes Phishing-Kit zielt auf Microsoft 365 ab
Ein neuartiges, getarntes und hartnäckiges PhaaS-Kit stiehlt Anmeldedaten und Authentifizierungs-Token von Microsoft 365-Nutzern, wie eine aktuelle Analyse von Barracuda zeigt [1]. Die Bedrohungsanalysten beobachten dieses neue und sich rasant weiterentwickelnde PhaaS-Kit seit Juli 2025 und haben es »Whisper 2FA« getauft. Im vergangenen Monat hat Barracuda fast eine Million Whisper 2FA-Angriffe auf Konten im Rahmen von……
-
Whisper 2FA Behind One Million Phishing Attempts Since July
Whisper 2FA is now one of the most active PhaaS tools alongside Tycoon and EvilProxy, responsible for one million attacks since July 2025 First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/whisper-2fa-behind-1m-phishing/
-
Whisper 2FA Behind One Million Phishing Attempts Since July
Whisper 2FA is now one of the most active PhaaS tools alongside Tycoon and EvilProxy, responsible for one million attacks since July 2025 First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/whisper-2fa-behind-1m-phishing/
-
Pixnapping Attack Hijacks Google Authenticator 2FA Codes in Under 30 Seconds
Security researchers have unveiled a sophisticated new attack technique dubbed >>Pixnapping
-
Pixnapping Attack Lets Attackers Steal 2FA on Android
The proof-of-concept exploit allows an attacker to steal sensitive data from Gmail, Google Accounts, Google Authenticator, Google Maps, Signal, and Venmo. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/pixnapping-attack-attackers-2fa-android
-
New Pixnapping Android Flaw Lets Rogue Apps Steal 2FA Codes Without Permissions
Tags: 2fa, android, attack, authentication, data, exploit, flaw, google, group, mfa, side-channel, vulnerabilityAndroid devices from Google and Samsung have been found vulnerable to a side-channel attack that could be exploited to covertly steal two-factor authentication (2FA) codes, Google Maps timelines, and other sensitive data without the users’ knowledge pixel-by-pixel.The attack has been codenamed Pixnapping by a group of academics from the University of California (Berkeley), University of…
-
Hackers can steal 2FA codes and private messages from Android phones
Malicious app required to make “Pixnapping” attack work requires no permissions. First seen on arstechnica.com Jump to article: arstechnica.com/security/2025/10/no-fix-yet-for-attack-that-lets-hackers-pluck-2fa-codes-from-android-phones/
-
Hackers can steal 2FA codes and private messages from Android phones
Malicious app required to make “Pixnapping” attack work requires no permissions. First seen on arstechnica.com Jump to article: arstechnica.com/security/2025/10/no-fix-yet-for-attack-that-lets-hackers-pluck-2fa-codes-from-android-phones/
-
‘Aggressive’ Akira Ransomware Blitz Clubs SonicWall 2FA to DEATH
Strange factors: Yet another security problem plaguing SonicWall customers. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/sonicwall-akira-ransomware-richixbw/
-
Cybersecurity Snapshot: CISA Highlights Vulnerability Management Importance in Breach Analysis, as Orgs Are Urged To Patch Cisco Zero-Days
Tags: 2fa, access, advisory, api, attack, authentication, breach, business, cisa, cisco, cloud, control, credentials, crime, cve, cyber, cybersecurity, data, defense, endpoint, exploit, fido, finance, firewall, framework, github, grc, guide, identity, incident response, infrastructure, Internet, ISO-27001, kev, law, lessons-learned, malicious, malware, mfa, mitigation, monitoring, network, open-source, phishing, privacy, ransomware, risk, saas, scam, security-incident, service, soc, software, supply-chain, tactics, threat, update, vpn, vulnerability, vulnerability-management, worm, zero-dayCISA’s takeaways of an agency hack include a call for timely vulnerability patching. Plus, Cisco zero-day bugs are under attack, patch now. Meanwhile, the CSA issued a framework for SaaS security. And get the latest on the npm breach, the ransomware attack that disrupted air travel and more! Here are six things you need to…
-
Avoiding 2FA for Local Accounts: Best Practices
Explore best practices for avoiding 2FA on local accounts while maintaining strong security. Learn about alternative authentication methods and robust security policies. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/avoiding-2fa-for-local-accounts-best-practices/
-
GitHub moves to tighten npm security amid phishing, malware plague
Hundreds of compromised packages pulled as registry shifts to 2FA and trusted publishing First seen on theregister.com Jump to article: www.theregister.com/2025/09/23/github_npm_registry_security/
-
GitHub tightens npm security with mandatory 2FA, access tokens
GitHub is introducing a set of defenses against supply-chain attacks on the platform that led to multiple large-scale incidents recently. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/github-tightens-npm-security-with-mandatory-2fa-access-tokens/
-
GitHub Mandates 2FA and Short-Lived Tokens to Strengthen npm Supply Chain Security
GitHub on Monday announced that it will be changing its authentication and publishing options “in the near future” in response to a recent wave of supply chain attacks targeting the npm ecosystem, including the Shai-Hulud attack.This includes steps to address threats posed by token abuse and self-replicating malware by allowing local publishing with required two-factor…
-
How npm Security Collapsed Thanks To a 2FA Exploit
Billions (No, that’s not a typo, Billions with a capital B) of files were potentially compromised. If you thought Node Package Manager (npm), the JavaScript runtime environment Node.js’s default package manager, had finally stopped having serious security problems, you thought wrong. This time, a two-factor authentication (2FA) phishing attack left developers frustrated, angry, and in..…
-
Phishing schlägt 2FA: Massiver Angriff auf npm-Pakete legt die Schwachstelle Mensch offen
First seen on t3n.de Jump to article: t3n.de/news/npm-supply-chain-angriff-phishing-malware-1706449/
-
Phishing schlägt 2FA: Massiver Angriff auf npm-Pakete legt die Schwachstelle Mensch offen
First seen on t3n.de Jump to article: t3n.de/news/npm-supply-chain-angriff-phishing-malware-1706449/

