Scroll Top

Hackers use job ads and cookie stealing to bypass 2FA and gain access to accounts

Futurist_cookiestealing

WHY THIS MATTERS IN BRIEF

Cookie stealing is quite new and lets hackers automatically bypass 2FA protections, so be careful otherwise you’ll loose your Microsoft account.

 

Love the Exponential Future? Join our XPotential Community, future proof yourself with courses from XPotential University, read about exponential tech and trendsconnect, watch a keynote, or browse my blog.

Cookie stealing is quite new and lets hackers automatically bypass 2FA protections, so be careful otherwise you’ll loose your Microsoft account.

 

RELATED
The first brain scale neuromorphic computer is about to go online

 

A new phishing scam has surfaced that is showing how sophisticated bad actors are becoming in tricking unsuspecting victims into giving up their personal information.

The latest cyberattack is centered around the job listing website, Indeed. Hackers send out an E-Mail spoofing an employment opportunity from the website. Once you click the link, it will send you to a Microsoft 365 login page to enter your credentials. From here you’re not suspecting anything unscrupulous, but the next time you attempt to log into your Microsoft 365 account, you will find that not only are you getting an error message that the information is incorrect, but that your account is no longer available.

Researchers at Menlo Security have observed this phishing scam, which is being targeted at US executives in industries including electronic manufacturing, banking and finance, real estate, insurance, and property management, according to Bleeping Computer.

 

RELATED
Sony and co form an alliance to use blockchain tech to fight DeepFakes

 

The cyberattack has been so seamless it has been able to evade multifactor authentication on Microsoft 365 accounts through a method called cookie stealing. This tactic is used to swipe the cookies from well-known websites and mimic their designs, and by hacking recent web sessions of programs that are not commonly refreshed bad actors web pages can look identical to those of common websites.

Cookie stealing was also developed as a bypass for multi-factor authentication. If you have the security feature set up on your account, you would likely input it yourself, having visually deemed the website to be trustworthy.

Researchers began noticing cookie stealing attacks in 2022, targeting several major brands, including Google Chrome, Amazon Web Services (AWS), Azure, Slack, and Electronic Arts.

 

RELATED
US Government unveils CAUSE, a program to predict cyber attacks before they happen

 

The hackers in this case used a platform called EvilProxy to execute their cookie stealing and fashion a page that looks like an authentic Microsoft login page. Multifactor authentication is commonplace for Microsoft 365 so users will have some form set up.

The addition of the Indeed E-Mail makes this phishing scam especially complex because opening the link triggers an open redirect, which is a weakness that allows the bad actor to direct you to their nefarious website after clicking on a seemingly legitimate link.

This isn’t the only phishing scam plaguing Microsoft services in recent times. Last month, for example, a team of hackers was able to infiltrate Microsoft Teams to execute a phishing scam called “DarkGate Loader.” The scheme centers on a bogus Teams message about “changes to the vacation schedule,” but contains intricate hidden malware when downloaded. Cybersecurity researchers uncovered that hackers were able to access Teams through compromised Office 365 accounts and even found the unsecured E-Mail addresses they were able to take over.

 

RELATED
The FBI warns people are using DeepFakes to apply for remote tech jobs

 

Ongoing spam and cybercrime have prompted E-Mail providers, including Gmail and Yahoo to set into place requirements for bulk senders as security measures. These requirements include E-Mail authentication, the ability to easily unsubscribe, and E-Mail assurance, and will be set in place starting February 1, 2024. Google said many of the requirements largely play as basic E-Mail hygiene but are being set forth with the aim of making it an industry standard.

Related Posts

Leave a comment

EXPLORE MORE!

1000's of articles about the exponential future, 1000's of pages of insights, 1000's of videos, and 100's of exponential technologies: Get The Email from 311, your no-nonsense briefing on all the biggest stories in exponential technology and science.

You have Successfully Subscribed!

Pin It on Pinterest

Share This