New Phishing Tool "Sneaky 2FA" Targets Microsoft 365 Users for Credential Stealing
Cybersecurity researchers have discovered a new phishing tool called Sneaky 2FA, which targets Microsoft 365 accounts to steal login credentials and two-factor authentication (2FA) codes. This phishing kit has been active since at least October 2024, and it was first spotted in December 2024 by the French cybersecurity company, Sekoia. The kit has been used on nearly 100 different websites, suggesting that cybercriminals are starting to use it more widely.
The Sneaky 2FA phishing kit is sold as a service, known as Phishing-as-a-Service (PhaaS), by a group called Sneaky Log. They offer this tool through a bot on Telegram. Buyers receive a version of the tool that’s disguised to hide its source code, which they can then use to carry out phishing attacks on their own.
The phishing attacks are designed to trick people into thinking they are receiving an email about a payment receipt. The email contains a link to a fake Microsoft 365 login page, where the victim’s credentials and 2FA codes are stolen. These fake pages often look like real Microsoft pages, using blurry background images to trick the user into entering their login details.
The kit also includes advanced anti-detection features, such as filtering out traffic from bots, VPNs, and cloud providers. This ensures only real users are sent to the fake pages. Additionally, the phishing pages use a central server to verify whether the subscription for the kit is still active, meaning that only paid users can run phishing campaigns.
Researchers have found connections between Sneaky 2FA and other phishing tools, suggesting the same group might be behind several phishing operations. Despite some similarities with other tools, such as W3LL Panel, Sneaky 2FA is considered a new phishing kit, not a replacement.
Mitigation Tips to Stay Safe:
- Be Cautious with Emails: Always be wary of unsolicited emails, especially ones that seem too good to be true (like fake payment receipts). Avoid clicking on links or downloading attachments from unknown sources.
- Check URL Addresses: Always double-check that the website you are visiting is legitimate, especially when asked to enter sensitive information. Look for signs of a fake site, such as blurry backgrounds or unusual URLs.
- Enable Multi-Factor Authentication (MFA): While the kit targets MFA codes, enabling MFA on all your accounts makes it harder for attackers to gain access even if they have your password.
- Use Security Software: Ensure your device has up-to-date security software to help detect and block phishing attacks.
- Stay Updated on Security Threats: Regularly monitor your accounts for unusual activity and update your passwords periodically to enhance security.
Source: https://thehackernews.com/2025/01/new-sneaky-2fa-phishing-kit-targets.html