Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Leadership and ManagementCybersecurity News

New phishing-as-a-service platform targets Microsoft 365

By Jordyn Alger, Managing Editor
Laptop with desktop screen showing

Sunrise King via Unsplash

December 4, 2024

By monitoring the rise of phishing-as-a-service platforms, Trustwave SpiderLabs discovered the emergence of Rockstar 2FA, which steals Microsoft 365 credentials via large-scale adversary-in-the-middle (AiTM) attacks. Targets of these attacks are directed to a fraudulent login page mimicking Microsoft 365 and prompting users to enter their credentials. 

Rockstar 2FA features include:

  • Bypass for two-factor authentication (2FA)
  • 2FA cookie harvesting
  • Fully undetectable (FUD) links 
  • Antibot protection
  • Telegram bot integration 
  • Themes mimicking popular service login pages

Security leaders weigh in 

Patrick Tiquet, Vice President, Security & Architecture at Keeper Security:

AiTM attacks, as seen with platforms like Rockstar 2FA, are becoming more common in phishing-as-a-service campaigns. While not all phishing-as-a-service offerings focus on AiTM techniques, the inclusion of features like session cookie harvesting and MFA bypass in this platform highlights how phishing methods continue to become more sophisticated. Security teams should take note, as these attacks demonstrate how protections like MFA can be circumvented if not part of a layered defense.

Tools that help enforce strong password policies, provide secure management of credentials and offer visibility into login activity are critical in addressing these threats. By integrating MFA with proactive measures such as session monitoring and conditional access policies, organizations can strengthen their defenses against AiTM tactics. The emergence of platforms like Rockstar 2FA should push security teams to reevaluate their strategies to ensure they are prepared for increasingly advanced phishing campaigns.

Stephen Kowski, Field CTO at SlashNext Email Security+:

Phishing has evolved beyond traditional email boundaries, with attackers now employing sophisticated techniques like Rockstar 2FA’s AiTM approach to bypass security measures by moving the phishing campaign beyond email. This trend underscores a shift towards multichannel phishing, where phishing campaigns don’t end with an email but continue through various communication channels like web browsers, messaging apps, and even social media. This multi-step process takes advantage of the perceived legitimacy of these platforms, making users more susceptible to attacks as they move from email to other channels. While AiTM attacks are part of this landscape, the key trend is the utilization of multiple channels to keep the phishing attack alive, often leveraging the trust users have in these platforms to bypass security. 

Krishna Vishnubhotla, Vice President of Product Strategy at Zimperium:

Phishing-as-a-service platforms are significantly lowering the cost of entry for new attackers, mainly through mobile devices. By providing ready-made phishing kits, these platforms eliminate the need for extensive technical skills or resources usually required for phishing attacks. Attackers can launch sophisticated campaigns against organizations with minimal investment and effort, leveraging mobile devices’ ubiquity and continual connectivity. This ease of access to advanced phishing tools, and the ability to target users on mobile devices, where security may be more lax, make it increasingly convenient and cost-effective for nefarious actors to execute efficacious cybercrimes.

KEYWORDS: phishing phishing campaigns security leaders threat intelligence

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jordynalger

Jordyn Alger is the managing editor for Security magazine. Alger writes for topics such as physical security and cyber security and publishes online news stories about leaders in the security industry. She is also responsible for multimedia content and social media posts. Alger graduated in 2021 with a BA in English – Specialization in Writing from the University of Michigan. Image courtesy of Alger

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Opened padlock on computer keyboard

10 Data Breaches to Know About (April 2026)

Laptop with desktop screen showing

Research: Microsoft Edge Loads Stored Passwords in Cleartext

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

Laptop in darkness

Reframing MFA Bypass: Four Identity Gaps Attackers Exploit

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

SEC 2026 Benchmark Banner

Events

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

June 10, 2026

Applying Agentic AI in Security Operations for Faster Decisions & Better Outcomes

Security teams have never had more visibility. We’ll explore how a new decision layer is helping security teams move from detection to decision. Turn alerts into decision-ready context, reducing reliance on manual triage and enabling faster action.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Related Articles

  • Padlock on laptop with neon lights

    Two-factor authentication phishing kit targets Microsoft 365 accounts

    See More
  • Office with workers

    Phishing campaign leverages Microsoft 365 infrastructure for attacks

    See More
  • Cloud icon

    Google Cloud Service Exploited in New Phishing Campaign

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing