Global analysis of Adversary-in-the-Middle phishing threats

Explore the 2025 landscape of Adversary-in-the-Middle phishing threats with data, trends, and top detection insights.

Sekoia.io Blog
Rockstar2FA Collapse Fuels Expansion of FlowerStorm Phishing-as-a-Service

Rockstar2FA disruption on November 11 spurred FlowerStorm phishing surge, targeting 10 countries and service sectors.

The Hacker News
A new Microsoft 365 phishing-as-a-service platform called " #FlowerStorm " is growing in popularity, filling the void left behind by the sudden shutdown of the #Rockstar2FA cybercrime service. #cybercrime #CyberSecurity https://www.bleepingcomputer.com/news/security/new-flowerstorm-microsoft-phishing-service-fills-void-left-by-rockstar2fa/
New FlowerStorm Microsoft phishing service fills void left by Rockstar2FA

A new Microsoft 365 phishing-as-a-service platform called "FlowerStorm" is growing in popularity, filling the void left behind by the sudden shutdown of the Rockstar2FA cybercrime service.

BleepingComputer
A new phishing-as-a-service (PhaaS) platform named ' #Rockstar2FA' has emerged, facilitating large-scale adversary-in-the-middle (AiTM) attacks to steal Microsoft 365 credentials.
#Cybersecurity #infosec
https://www.bleepingcomputer.com/news/security/new-rockstar-2fa-phishing-service-targets-microsoft-365-accounts/
New Rockstar 2FA phishing service targets Microsoft 365 accounts

A new phishing-as-a-service (PhaaS) platform named 'Rockstar 2FA' has emerged, facilitating large-scale adversary-in-the-middle (AiTM) attacks to steal Microsoft 365 credentials.

BleepingComputer
Rockstar 2FA: A Driving Force in Phishing-as-a-Service (PaaS)

Trustwave SpiderLabs has been actively monitoring the rise of Phishing-as-a-Service (PaaS) platforms, which are increasingly popular among threat actors.