⚠️ Enterprise #phishing is now abusing Microsoft & Google Cloud. Trusted domains don’t get flagged by common detection tools, leaving companies exposed.
❗ #Sneaky2FA specifically targets corporate emails. See the analysis session and gather #IOCs: https://app.any.run/tasks/96dbe668-1be7-4001-be2c-edec54df09f7/?utm_source=mastodon&utm_medium=post&utm_campaign=enterprise_phishing_analysis_case&utm_term=120226&utm_content=linktoservice

Learn how these attacks work and what it takes for SOC teams to detect them: https://any.run/cybersecurity-blog/enterprise-phishing-analysis/?utm_source=mastodon&utm_medium=post&utm_campaign=enterprise_phishing_analysis_case&utm_term=120226&utm_content=linktoblog

#cybersecurity #infosec

🚨 #Phishing on Trusted Cloud Infrastructure: Google, Microsoft, Cloudflare.
We’re tracking a growing trend where phishing kit infrastructure is hosted on legitimate cloud and CDN platforms, not newly registered domains. In some cases, these campaigns specifically target enterprise users. This creates serious visibility challenges for security teams.

We’ve observed this pattern across multiple #phishkits:
πŸ”Ή #Tycoon hosted on alencure[.]blob[.]core[.]windows[.]net (Microsoft Azure Blob Storage): https://app.any.run/tasks/29b53d89-99b4-4827-b0af-72f315fdf529/?utm_source=mastodon&utm_medium=post&utm_campaign=trusted_cloud_infrastructure&utm_term=150126&utm_content=linktoservice
⚠️ #Sneaky2FA hosted on legitimate cloud platforms, filtering out free email domains via a fake Microsoft 365 login to target corporate accounts:
firebasestorage[.]googleapis[.]com (Cloud Storage for Firebase): https://app.any.run/tasks/8189dd5e-0159-480d-8654-7b438a73f11e?utm_source=mastodon&utm_medium=post&utm_campaign=trusted_cloud_infrastructure&utm_term=150126&utm_content=linktoservice
cloudfront[.]net (AWS CloudFront): https://app.any.run/tasks/9a2d1537-e952-455e-bba0-b36f720a07e6/?utm_source=mastodon&utm_medium=post&utm_campaign=trusted_cloud_infrastructure&utm_term=150126&utm_content=linktoservice
πŸ”Ή #EvilProxy hosted on sites[.]google[.]com (Google Sites): https://app.any.run/tasks/07995c22-6e7d-468b-ad94-29af75525ed3/?utm_source=mastodon&utm_medium=post&utm_campaign=trusted_cloud_infrastructure&utm_term=150126&utm_content=linktoservice

Victims see a β€œtrusted” provider domain, while the network only sees normal HTML being loaded from cloud infrastructure. What looks clean at first glance is exposed by #ANYRUN Sandbox in under 60 seconds, directly reducing MTTD and MTTR.

πŸ” Hunt for related activity and pivot from #IOCs using these search queries in TI Lookup:
πŸ”Ή Microsoft Azure Blob Storage abuse: https://intelligence.any.run/analysis/lookup?utm_source=mastodon&utm_medium=post&utm_campaign=trusted_cloud_infrastructure&utm_term=150126&utm_content=linktotilookup#%7B%22query%22:%22threatName:%5C%22phishing-ml%5C%22%20and%20domainName:%5C%22*.blob.core.windows.net$%5C%22%22,%22dateRange%22:30%7D
πŸ”Ή Firebase Cloud Storage abuse: https://intelligence.any.run/analysis/lookup?utm_source=mastodon&utm_medium=post&utm_campaign=trusted_cloud_infrastructure&utm_term=150126&utm_content=linktotilookup#%7B%2522query%2522:%2522domainName:%255C%2522firebasestorage.googleapis.com$%255C%2522%2520AND%2520(domainName:%255C%2522.icu$%255C%2522%2520OR%2520domainName:%255C%2522.xyz$%255C%2522)%2522,%2522dateRange%2522:60%7D%20%20
πŸ”Ή Google Sites abuse: https://intelligence.any.run/analysis/lookup?utm_source=mastodon&utm_medium=post&utm_campaign=trusted_cloud_infrastructure&utm_term=150126&utm_content=linktotilookup#%7B%2522query%2522:%2522domainName:%255C%2522sites.google.com$%255C%2522%2520AND%2520suricataMessage:%255C%2522*Possible%2520Fake%2520Microsoft%2520Sign-in%2520domain%2520chain*%255C%2522%2522,%2522dateRange%2522:60%7D%20%20

Many security vendors will flag these domains as legitimate. Technically, they are. That’s why security teams need behavioral analysis and network-level signals to reliably uncover phishing before impact.

πŸš€ Speed up detection and gain full visibility into complex threats with #ANYRUN. Sign up: https://app.any.run/?utm_source=mastodon&utm_medium=post&utm_campaign=trusted_cloud_infrastructure&utm_term=150126&utm_content=register#register
#ExploreWithANYRUN

#IOCs:
mphdvh[.]icu
kamitore[.]com
aircosspascual[.]com
Lustefea[.]my[.]id

#cybersecurity #infosec

Sneaky2FA has added Browser-in-the-Browser (BITB) capabilities to display fake Microsoft login windows that match the victim’s OS and browser environment.

Highlights:
β€’ Cloudflare Turnstile evasion
β€’ Conditional loading β†’ redirects scanners
β€’ W3LL Panel OV6 code components
β€’ Heavy HTML/JS obfuscation
β€’ Domain rotation + URL masking

Full breakdown: https://www.technadu.com/sneaky2fa-phishing-kit-adopts-browser-in-the-browser-tactics-to-steal-credentials-via-fake-microsoft-login-pages/613957/

Follow for more threat intel updates.

#CyberSecurity #Phishing #BITB #Sneaky2FA #ThreatIntel #Microsoft365

πŸ‘Ύ #Sneaky2FA is a #phishing kit that beats corporate 2FA and steals Microsoft 365 credentials. Equipped with evasion mechanisms, it can bypass detection.

Learn to catch it and gather fresh #IOCs: https://any.run/malware-trends/sneaky2fa/?utm_source=mastodon&utm_medium=post&utm_campaign=sneaky2fa&utm_content=tracker&utm_term=160625

🎣 Leveraging our telemetry and proactive hunting, we ranked the most widespread AitM phishing kits - #Tycoon2FA, #Storm1167, #NakedPages, #Sneaky2FA, and more.

Additionally, the article includes summary sheets covering 11 AitM phishing kits.

🚨 New Threat Alert: #Sneaky2FA PhaaS targets Microsoft 365, leveraging AiTM phishing, anti-bot features, and Telegram-based operations. Real-time credential theft + session hijacking = 🚩.

Read: https://hackread.com/telegram-sneaky-2fa-phishing-kit-microsoft-365-accounts/

#CyberSecurity #Phishing #Microsoft365 #Telegram #Scam

Telegram-Based "Sneaky 2FA" Phishing Kit Targets Microsoft 365 Accounts

Follow us on Bluesky, Twitter (X) and Facebook at @Hackread

Hackread - Latest Cybersecurity, Tech, Crypto & Hacking News

πŸ” TDR analysts discovered a new Adversary-in-the-Middle (#AiTM) #phishing kit, specifically targeting Microsoft 365 accounts and circumventing 2-step verification: Sneaky 2FA

https://blog.sekoia.io/sneaky-2fa-exposing-a-new-aitm-phishing-as-a-service/

#detection #sneaky2fa

Sneaky 2FA: exposing a new AiTM Phishing-as-a-Service

In this blog post, learn about Sneaky 2FA, a new Adversary-in-the-Middle (AiTM) phishing kit targeting Microsoft 365 accounts.

Sekoia.io Blog