Slick new phishing-as-a-service kit emerges

By

EvilProxy covers accounts with most major brands.

Security researchers at Resecurity have detailed a new phishing-as-a-service kit, EvilProxy, that provides an easy to use interface to attack users with accounts for major online brands, and the ability to bypass multifactor authentication (MFA).

Slick new phishing-as-a-service kit emerges
EvilProxy attack flow.
Resecurity

Reverse proxies to attack multifactor authentication, such as Modlishka, have been available for several years, but EvilProxy makes it it possible to easily create and deliver advanced phishing links through a graphical user interface, Resecurity said.

EvilProxy sits between a victim and the real site the user is trying to connect to, capturing their valid session cookies, to bypass the need to authenticate with user names, passwords, and / or two-factor authentication tokens, the security vendor explained.

This includes accounts that have MFA enabled with short messaging text service, or application tokens.

Accounts with major brands such as Apple, Facebook, GoDaddy, GitHub, Google, Dropbox, Instagram, Microsoft, Twitter, Yahoo and Yandex can be attacked with EvilProxy.

Available since May this year, Resecurity said EvilProxy costs US$400 a month to rent.

CyberCX executive director of security testing and assurance Adam Boileau explained to iTnews that EvilProxy cannot bypass hardware key authentication.

"U2F, FIDO, and WebAuthn are cryptographically bound to the site they are authenticating to -  there is some public/private key stuff and basically the challenge that the hardware key answers is signed, such that only the real site can process the response," Boileau said.

"The responsibility of understanding who you're authenticating to is taken out of human hands," he added.

Boileau said every other MFA scheme such as one-time passwords and push notifications require humans to be involved in the above choice.

 

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:

Most Read Articles

Woolworths' CSO is Optus-bound

Woolworths' CSO is Optus-bound

Australia's super funds told to assess authentication controls

Australia's super funds told to assess authentication controls

Hackers abuse modified Salesforce app to steal data, extort companies

Hackers abuse modified Salesforce app to steal data, extort companies

The Northern Beaches Women's Shelter hones focus on tech-enabled abuse

The Northern Beaches Women's Shelter hones focus on tech-enabled abuse

Log In

  |  Forgot your password?