
Global analysis of Adversary-in-the-Middle phishing threats
Explore the 2025 landscape of Adversary-in-the-Middle phishing threats with data, trends, and top detection insights.
Sekoia.io Blog
Rockstar2FA Collapse Fuels Expansion of FlowerStorm Phishing-as-a-Service
Rockstar2FA disruption on November 11 spurred FlowerStorm phishing surge, targeting 10 countries and service sectors.
The Hacker NewsA new Microsoft 365 phishing-as-a-service platform called "
#FlowerStorm " is growing in popularity, filling the void left behind by the sudden shutdown of the
#Rockstar2FA cybercrime service.
#cybercrime #CyberSecurity https://www.bleepingcomputer.com/news/security/new-flowerstorm-microsoft-phishing-service-fills-void-left-by-rockstar2fa/
New FlowerStorm Microsoft phishing service fills void left by Rockstar2FA
A new Microsoft 365 phishing-as-a-service platform called "FlowerStorm" is growing in popularity, filling the void left behind by the sudden shutdown of the Rockstar2FA cybercrime service.
BleepingComputerA new phishing-as-a-service (PhaaS) platform named '
#Rockstar2FA' has emerged, facilitating large-scale adversary-in-the-middle (AiTM) attacks to steal Microsoft 365 credentials.
#Cybersecurity #infosec https://www.bleepingcomputer.com/news/security/new-rockstar-2fa-phishing-service-targets-microsoft-365-accounts/
New Rockstar 2FA phishing service targets Microsoft 365 accounts
A new phishing-as-a-service (PhaaS) platform named 'Rockstar 2FA' has emerged, facilitating large-scale adversary-in-the-middle (AiTM) attacks to steal Microsoft 365 credentials.
BleepingComputer
Rockstar 2FA: A Driving Force in Phishing-as-a-Service (PaaS)
Trustwave SpiderLabs has been actively monitoring the rise of Phishing-as-a-Service (PaaS) platforms, which are increasingly popular among threat actors.