Tag: 2fa
-
Supply chain attack targets npm, +2 Billion weekly npm downloads exposed
Multiple popular npm packages were compromised in a supply chain attack after a maintainer fell for a phishing email targeting 2FA credentials. A supply chain attack compromised multiple popular npm packages with 2B weekly downloads after a maintainer fell for a phishing email mimicking npm, targeting 2FA credentials. Threat actors targeted Josh Junon’s (Qix) to…
-
How One Phishing Email Compromised 18 npm Packages and Billions of Installs
On September 8, 2025, a single phishing email triggered one of npm’s most damaging supply chain attacks, compromising 18 popular JavaScript packages with over 2.6 billion weekly downloads. By tricking a maintainer into revealing credentials and 2FA codes, attackers injected crypto-stealing malware into widely used libraries. This blog unpacks how it happened, which packages were…
-
Axios Abuse and Salty 2FA Kits Fuel Advanced Microsoft 365 Phishing Attacks
Threat actors are abusing HTTP client tools like Axios in conjunction with Microsoft’s Direct Send feature to form a “highly efficient attack pipeline” in recent phishing campaigns, according to new findings from ReliaQuest.”Axios user agent activity surged 241% from June to August 2025, dwarfing the 85% growth of all other flagged user agents combined,” the…
-
Fake npm 2FA reset email led to compromise of popular code packages
Malicious versions of at least 18 widely used npm packages were uploaded to the npm Registry on Monday, following the compromise of their maintainer’s account. … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/09/09/npm-packages-supply-chain-compromise/
-
Fremde Anmeldungen an Microsoft Konten trotz 2FA Teil 2
Es ist ein kruder Sachverhalt, auf den ich mir noch keinen endgültigen Reim machen kann. Seit einigen Wochen finden Zugriffe auf Microsoft Konten durch Dritte statt, die im Aktivitätsverlauf zu sehen ist. Dabei haben die Nutzer die Zweifaktor-Authentifizierung für die … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/09/05/fremde-anmeldungen-an-microsoft-konten-trotz-2fa-teil-2/
-
Forscher warnen: Android-Malware klaut 2FA-Codes aus Google Authenticator
Eine Android-Malware namens Brokewell erweist sich als äußerst kompetent. Sie sammelt allerhand vertrauliche Daten – inklusive 2FA-Codes. First seen on golem.de Jump to article: www.golem.de/news/forscher-warnen-android-malware-klaut-2fa-codes-aus-google-authenticator-2509-199708.html
-
REWE Bonus der Punkteklau geht in die nächste Runde!
Tags: 2faMan hatte vollmundig angekündigt, die Accounts der REWE Bonus-Kunden mittels 2FA ordentlich schützen zu wollen. Doch das ist nicht passiert. First seen on tarnkappe.info Jump to article: tarnkappe.info/kommentar/rewe-bonus-der-punkteklau-geht-in-die-naechste-runde-320075.html
-
Ups, Password Manager-Schwachstelle in 11 Produkten ermöglichen Datenklau
Viele Nutzer verwalten ihre Kennwörter in Passwort-Managern. Sicherheitsforscher haben sich 11 beliebte Erweiterungen (1Password, LastPass, iCloud und weitere) genauer angesehen. Dabei wurden diese als anfällig identifiziert wodurch Anmeldedaten, 2FA-Codes und Kreditkartendaten gefährdet sind. Die Meldung wurde bereits vorige Woche … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/08/24/ups-password-manager-schwachstelle-in-11-produkten-ermoeglichen-datenklau/
-
Major password managers can leak logins in clickjacking attacks
Six major password managers with tens of millions of users are currently vulnerable to unpatched clickjacking flaws that could allow attackers to steal account credentials, 2FA codes, and credit card details. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/major-password-managers-can-leak-logins-in-clickjacking-attacks/
-
New Salty 2FA PhaaS Platform Targets Microsoft 365 Users to Steal Login Credentials
The majority of events globally are caused by phishing, which continues to be the most common vector for cyberattacks in the constantly changing world of cyber threats. The proliferation of affordable Phishing-as-a-Service (PhaaS) platforms such as Tycoon2FA, EvilProxy, and Sneaky2FA has exacerbated this issue, enabling even novice attackers to deploy sophisticated campaigns. These services are…
-
9 things CISOs need know about the dark web
Tags: 2fa, access, ai, attack, automation, backup, blockchain, botnet, breach, captcha, ceo, ciso, communications, corporate, credentials, crypto, cyber, cybercrime, cybersecurity, dark-web, data, data-breach, ddos, deep-fake, defense, detection, dns, exploit, extortion, finance, fraud, group, guide, hacking, identity, incident, incident response, infrastructure, intelligence, international, jobs, law, leak, lockbit, malicious, malware, marketplace, mfa, monitoring, network, open-source, phishing, privacy, ransomware, resilience, risk, russia, saas, scam, service, strategy, tactics, technology, threat, tool, training, vpn, vulnerability, zero-dayNew groups form after major marketplaces are disrupted: International takedown efforts damage infrastructure and curb cybercrime operations by disrupting larger operations, removing major players from the ecosystem and scattering user bases.However, the dark web is highly adaptive and sophisticated actors often maintain contingency plans, including mirrors, backups, and alternative forums, according to Edward Currie, associate…
-
Open Source: Proton bringt eigene Authenticator-App auf den Markt
Die quelloffene App ermöglicht sichere Log-ins per 2FA, eine verschlüsselte Synchronisation und ist ab sofort für alle gängigen Systeme verfügbar. First seen on golem.de Jump to article: www.golem.de/news/open-source-proton-bringt-eigene-authenticator-app-auf-den-markt-2508-198716.html
-
Android Malware-as-a-Service Gets Cheaper, Packing 2FA Interception
Malware-as-a-service (MaaS) platforms like PhantomOS and Nebula are democratizing Android device attacks because they provide pre-built, subscription-based malware kits for as little as $300 per month, marking a fundamental shift in the cybercrime scene. These services eliminate the need for coding expertise, providing cybercriminals with fully functional Android trojans equipped with advanced capabilities like two-factor…
-
Critical CitrixBleed 2 vulnerability has been under active exploit for weeks
Exploits allow hackers to bypass 2FA and commandeer vulnerable devices. First seen on arstechnica.com Jump to article: arstechnica.com/security/2025/07/critical-citrixbleed-2-vulnerability-has-been-under-active-exploit-for-weeks/
-
Qwizzserial Android Malware Masquerades as Legit Apps to Steal Banking Data and Intercept 2FA SMS
A new and alarming Android malware family, dubbed Qwizzserial, has emerged as a significant threat, particularly targeting users in Uzbekistan. Discovered by Group-IB in March 2024, this SMS stealer is designed to intercept two-factor authentication (2FA) codes and steal sensitive banking information, posing a severe risk to personal and financial security. Disguised as legitimate applications…
-
Aegis Authenticator: Free, open-source 2FA app for Android
Aegis Authenticator is an open-source 2FA app for Android that helps you manage login codes for your online accounts. The app features strong encryption and the ability to … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/07/07/aegis-2fa-authenticator-free-open-source-android/
-
APT42 impersonates cyber professionals to phish Israeli academics and journalists
Iran-linked APT42 targets Israeli experts with phishing attacks, posing as security professionals to steal email credentials and 2FA codes. Iran-linked group APT42 (aka Educated Manticore, Charming Kitten, and Mint Sandstorm) is targeting Israeli journalists, cybersecurity experts, and academics with phishing attacks, posing as security professionals to steal email credentials and 2FA codes, according to Check Point.…
-
BSI warnt: Immer weniger Menschen nutzen 2FA und sichere Passwörter
Eine neue Untersuchung des BSI zeigt einen bedenklichen Trend. Menschen verhalten sich im Netz trotz hoher Bedrohungslage immer unvorsichtiger. First seen on golem.de Jump to article: www.golem.de/news/bsi-warnt-immer-weniger-menschen-nutzen-2fa-und-sichere-passwoerter-2506-197389.html
-
6 Best Authenticator Apps for 2025
Tags: 2fa2FA authenticator apps add an extra layer of security to your accounts. Explore the best options for seamless protection and peace of mind. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/best-authenticator-apps/
-
Hacker nehmen Rüstungslieferanten der Ukraine ins Visier
Tags: 2fa, access, authentication, bug, cyberattack, exploit, hacker, mail, mfa, password, software, strategy, ukraine, vulnerabilityRussische Hacker greifen gezielt Rüstungsfirmen an, die die Ukraine mit Waffen versorgen.Die berüchtigte russische Hackergruppe Fancy Bear hat gezielt Rüstungsfirmen angegriffen, die Waffen an die Ukraine liefern. Das geht aus einer aktuellen Studie des slowakischen Sicherheitsunternehmens Eset aus Bratislava hervor. Danach richteten sich die Angriffe vor allem gegen Hersteller sowjetischer Waffentechnik in Bulgarien, Rumänien und…
-
Twilio denies breach following leak of alleged Steam 2FA codes
Twilio has denied in a statement for BleepingComputer that it was breached after a threat actor claimed to be holding over 89 million Steam user records with one-time access codes. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/twilio-denies-breach-following-leak-of-alleged-steam-2fa-codes/
-
Crypto users embrace 2FA, lag in other protections
First seen on scworld.com Jump to article: www.scworld.com/brief/crypto-users-embrace-2fa-lag-in-other-protections
-
AiTM Phishing Kits Bypass MFA by Hijacking Credentials and Session Tokens
Tags: 2fa, attack, authentication, credentials, cyber, cybercrime, exploit, mfa, phishing, service, softwareDarktrace’s Security Operations Center (SOC) in late 2024 and early 2025, cybercriminals have been exploiting legitimate Software-as-a-Service (SaaS) platforms like Milanote to orchestrate sophisticated phishing campaigns. These attacks, bolstered by the Tycoon 2FA phishing kit, demonstrate an advanced Adversary-in-the-Middle (AiTM) approach that circumvents multi-factor authentication (MFA) protections. Leveraging Legitimate Services for Stealthy Attacks By abusing…
-
Coinbase fixes 2FA log error making people think they were hacked
Coinbase has fixed a confusing bug in its account activity logs that caused users to think their credentials were compromised. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/coinbase-fixes-2fa-log-error-making-people-think-they-were-hacked/
-
‘SessionShark’ A New Toolkit Bypasses Microsoft Office 365 MFA Security
Tags: 2fa, authentication, cyber, cybercrime, marketplace, mfa, microsoft, office, phishing, service, threatSecurity researchers have uncovered a new and sophisticated threat to Microsoft Office 365 users: a phishing-as-a-service toolkit dubbed “SessionShark O365 2FA/MFA.” Promoted through cybercriminal marketplaces, SessionShark is designed to bypass Microsoft’s multi-factor authentication (MFA) protections”, an alarming escalation in the ongoing battle between defenders and cyber attackers. A Toolkit Purpose-Built to Evade 2FA and MFA…
-
Tycoon 2FA phishing kit adds stealth, expands to mobile devices
First seen on scworld.com Jump to article: www.scworld.com/news/tycoon-2fa-phishing-kit-adds-stealth-expands-to-mobile-devices
-
Cryptohack Roundup: US Disbands Cryptocurrency Legal Team
Also: PoisonSeed Phishing Campaign, FTX Clients Face Reimbursement Hurdle. This week, Trump administration disbanded a Justice Department crypto unit, the U.S. Securities and Exchange Commission will review crypto guidance, Usual pledged up to $16M in bug bounties, a PoisonSeed phishing campaign, FTX repayment plan troubles and a Coinbase 2FA error. First seen on govinfosecurity.com Jump…
-
Coinbase to fix 2FA account activity entry freaking out users
Coinbase is fixing an incorrect account activity message that freaks out customers and makes them think their credentials were compromised. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/coinbase-to-fix-2fa-account-activity-entry-freaking-out-users/

