Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity News

Two-factor authentication phishing kit targets Microsoft 365 accounts

By Jordyn Alger, Managing Editor
Padlock on laptop with neon lights

FlyD via Unsplash

January 21, 2025

Research from Sekoia has unveiled a phishing-as-a-service (PhaaS) kit sold by “Sneaky Log”, a cybercrime service operating via a bot on Telegram. These phishing pages have been in circulation since October 2024 at least, and they have targeted Microsoft 365 accounts.

Below, security experts discuss the techniques observed in this kit and provide advice for defending against similar threats. 

Security leaders weigh in 

Elad Luz, Head of Research at Oasis Security:

This phishing technique is particularly deceptive for several reasons:

  • The links in the phishing emails are crafted to pass the victim’s email address to the login page, enabling it to ‘autofill’ the email field. This mimics the behavior of legitimate websites, where autofill is typically associated with accounts users have previously logged into.
  • Threat actors blurred out screenshots of Microsoft webpages to create a convincing login background, making it appear as though users will access legitimate content after successfully logging in.
  • They also implemented common methods on the web page to distinguish between humans and bots. If the visitor is detected as a bot, the page either displays harmless content or redirects to a legitimate website like Wikipedia. This tactic helps evade automated detection by security systems.

This phishing kit was developed by one group of threat actors and sold to others, highlighting the collaborative nature of many cyberattacks. These malicious tools are often the result of layered efforts by different actors, working together and trading resources. The fact that such kits are readily available for purchase is highly concerning.

As always, users are advised to exercise extreme caution with emails and to verify the legitimacy of websites before entering their credentials. Security teams should adopt advanced threat detection solutions that monitor sign-in logs and deploy effective tools to fingerprint attackers and detect anomalies.

Stephen Kowski, Field CTO at SlashNext Email Security+:

This kit’s “sneaky” aspects include its sophisticated ability to populate victim email addresses automatically, its evasion of detection through Cloudflare Turnstile challenges, and its clever redirection of security tools to Wikipedia pages. The kit is a full-featured PhaaS platform with real-time credential and session cookie theft capabilities, making it particularly dangerous for Microsoft 365 environments. Protection requires phishing-resistant authentication methods like FIDO2/WebAuthn, real-time URL scanning at the time of click that completely bypasses Cloudflare Turnstile protection and proactive detection of newly registered phishing domains before they become active threats.

Patrick Tiquet, Vice President, Security & Architecture at Keeper Security: 

The “Sneaky 2FA” phishing kit is aptly named for its ability to outmaneuver traditional security defenses through Adversary-in-The-Middle (AitM) attacks. By intercepting both credentials and two-factor authentication (2FA) codes in real time, it allows attackers to bypass one of the most relied-upon layers of account protection. Its sophistication lies in its anti-analysis features – such as traffic filtering and checks to avoid detection – and convincing pre-populated login forms, which enhance its success rate. Additionally, hosting the phishing pages on compromised infrastructure adds another layer of deception.

Organizations can mitigate this risk by implementing Privileged Access Management (PAM) to restrict access and contain potential damage from compromised accounts. Pairing this with robust password management ensures that credentials are strong, unique and securely stored, reducing exposure to phishing campaigns. Additionally a password manager will prevent users from entering credentials into spoofed websites because the tool will only auto-fill credentials on the authentic webpage. Enforcing layered security measures, such as advanced threat detection and employee training, further minimizes organizational risk.

KEYWORDS: phishing research security leaders two-factor authentication

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jordynalger

Jordyn Alger is the managing editor for Security magazine. Alger writes for topics such as physical security and cyber security and publishes online news stories about leaders in the security industry. She is also responsible for multimedia content and social media posts. Alger graduated in 2021 with a BA in English – Specialization in Writing from the University of Michigan. Image courtesy of Alger

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Gmail on computer

    Gmail, Yahoo targeted by a new two-factor authentication phishing kit

    See More
  • Laptop with desktop screen showing

    New phishing-as-a-service platform targets Microsoft 365

    See More
  • Colorful laptop

    Security leaders discuss botnet attack against Microsoft 365 accounts

    See More

Related Products

See More Products
  • The Database Hacker's Handboo

  • GSEC.jpg

    GSEC GIAC Security Essentials Certification All-In-One Exam Guide, 2E

See More Products

Events

View AllSubmit An Event
  • December 3, 2024

    The Ultimate Two-Way Radio Webinar

    ON DEMAND: In this webinar, you will learn about the different radio communications solutions and the latest innovations. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing