Toggle Side Panel
Abibitumi.com
Site Icon
  • Members Only
  • Shop
  • Newsletter
  • Affiliate
  • Conference
  • Sankɔfa Journey
  • Quiet Warrior: The BlackNificent Legacy of Nana Kamau Kambon [HD]
  • Log In
Toggle Side Panel
Abibitumi.com
  • MEMBERS ONLY
  • SHOP
  • BECOME AN AFFILIATE
More options

    Shopping Cart

    No products in the cart.

    Sign in Sign up

    Shopping Cart

    No products in the cart.

    • Members Only
    • Shop
    • Newsletter
    • Affiliate
    • Conference
    • Sankɔfa Journey
    • Quiet Warrior: The BlackNificent Legacy of Nana Kamau Kambon [HD]
    • Log In
    Close search
    Home » Newsfeed
      • Profile Photo
        Profile photo of Yaw Pereko
        Cyber Security Awareness
        Yaw Pereko 9 months ago

        22,424 Abibisika (Black Gold) Points
        Badges: UNIA Member – Powered by Abibitumi
        Rank: Unranked Newbie

        It seems no one is safe in the unnatural Cyber world, and hopelessness seems to be spreading all over the world.

        Never give up and TRUST NO ONE before verifying through their actions and ethical moral character.

        We must be even more vigilant in the Internet digital social-media world as we should be with our relationships.

        Astaroth Phishing Kit Bypasses 2FA Using Reverse Proxy Techniques

        Astaroth is primarily distributed through Telegram and promoted across cybercrime forums and marketplaces.

        Why Astaroth Stands Out

        Astaroth’s real-time interception capability differentiates it from traditional phishing kits. Conventional kits capture login credentials but often fail to compromise 2FA-protected accounts. Astaroth, however, dynamically intercepts and forwards tokens, enabling attackers to gain access as soon as authentication occurs.

        “Attackers now use man-in-the-middle reverse proxies to mimic legitimate sites, capturing usernames, passwords, 2FA tokens and session cookies instantly,” explained Jason Soroko, a senior fellow at Sectigo. “This method hijacks authenticated sessions before security can react, rendering 2FA ineffective.”

        “Finally, Astaroth is primarily distributed through Telegram and promoted across cybercrime forums and marketplaces. Unfortunately, the accessibility of these platforms, combined with the anonymity they offer, makes it quite difficult for law enforcement to track and disrupt its sales.”

        https://www.infosecurity-magazine.com/

        infosecurity-magazine.com

        Infosecurity Magazine - Strategy, Insight, Technology

        The award winning online magazine dedicated to the strategy, insight and technology of information security

        Like
        Paa Kwesi 27 and Tamara
        4 Comments
        • Profile photo of Njideka
          Njideka
          22,348 Abibisika (Black Gold) Points
          Badges: Abibitumi Mbôngi
          Rank: Onímẹ́rindínlógún

          As you said, “We must be even more vigilant in the Internet digital social-media world as we should be with our relationships.” …If 2FA is compromised, then what? Meda ase for sharing.

          Like
          1
          9 months ago
          • Profile photo of Yaw Pereko
            Yaw Pereko (edited)
            22,424 Abibisika (Black Gold) Points
            Badges: UNIA Member – Powered by Abibitumi
            Rank: Unranked Newbie

            @ena_njideka

            Thank you for your response and follow up question Njideka.
            Here is my response and hopes it helps and clarify things better for all who wish to get secure and stay secure.

            Having no Two-Fators at all is the least secure state you can be in today.

            Login-password (First factor) and SMS or Email (second factor) authentication.

            The attacker must have all of the above to take over your account, so this is why you should have a strong password that is not share across other accounts.
            SMS text messaging (Second factor for account login access)

            Possible ways to obtain your login credentials:

            • SIM swapping (Redirect text messages)
            • Physical theft – lost phone
            • Phishing
            • Telephone company breach

            Steps to better protect yourself:

            Contact your phone company and see if there is any higher security they can provide, such as having a PIN to make any changes on your phone accounts.
            Take steps to prevent your phone number from being assigned to someone else.

            1. Set up a “Authentication Application” link to your online accounts (Google authenticator or other similar tools).
            2. Keep your phone secure at all times.
            3. Don’t give or share your password with anyone.
            4. Use a physical UBIKEY authentication (Great solution)
            5. Using your third factor (Fingerprint or Face recognition)
            6. Use your “Fourth factor” authentication which is your common sense

            What are authentication factor challenges and solutions?
            https://www.youtube.com/watch?v=2Iwm0-3JTIw

            No folders found. Please create and select folder.

            Documents
              Following special characters are not supported: \ / ? % * : | " < >
              Cancel Create
              Create new folder Cancel Move
              Network-security-39.jpg 37 KB Image File - Click to view
              Options
              • Copy Download Link
              9 months ago
              • Profile photo of Njideka
                Njideka
                22,348 Abibisika (Black Gold) Points
                Badges: Abibitumi Mbôngi
                Rank: Onímẹ́rindínlógún

                Meda ase Brother Yaw for the informative follow-up info. UBIKEY/YUBIKEY- I had to go look that up.
                But, the bottom line regarding 2FA is that it’s still a good means for securing your info, right?

                Like
                1
                9 months ago
                • Profile photo of Yaw Pereko
                  Yaw Pereko
                  22,424 Abibisika (Black Gold) Points
                  Badges: UNIA Member – Powered by Abibitumi
                  Rank: Unranked Newbie

                  @ena_Njideka

                  Yes, Yes, Yes!!!!

                  Like
                  1
                  9 months ago
              • Public
              • All Members
              • My Connections
              • Only Me
              • Public
              • All Members
              • My Connections
              • Only Me
              • Public
              • All Members
              • My Connections
              • Only Me

              Yaw Pereko’s Connections

              Newest | Active | Popular
              • Profile photo of Ɔbenfo Ọbádélé
                113,808 Abibisika (Black Gold) Points
                Badges: UNIA Member – Powered by Abibitumi Abibitumi Mbôngi
                Rank: Abibinwanwa Full Member
                Ɔbenfo Ọbádélé
                active 5 minutes ago
              • Profile photo of Kwaku.Akhu
                8,706 Abibisika (Black Gold) Points
                Rank: Unranked Newbie
                Kwaku.Akhu
                active 5 minutes ago
              • Profile photo of AgyaKwadwo
                5,900 Abibisika (Black Gold) Points
                Badges: UNIA Member – Powered by Abibitumi Abibitumi Mbôngi
                Rank: Abibinwanwa Full Member
                AgyaKwadwo
                active 33 minutes ago
              • Profile photo of Kwasi
                13,730 Abibisika (Black Gold) Points
                Badges: Abibitumi Mbôngi
                Rank: Onímẹ́rindínlógún
                Kwasi
                active an hour ago
              • Profile photo of Abibitumi Ahemfie
                2,890 Abibisika (Black Gold) Points
                Badges: Abibitumi Mbôngi UNIA Member – Powered by Abibitumi
                Rank: Abibinwanwa Full Member
                Abibitumi Ahemfie
                active an hour ago
              See all

              Abibisika Points Purchase

              You need to log in to purchase this.
              • Abibitumi Info Brochure
              • Terms and Conditions
              • Shipping and Return Policy
              • About Us
              © 2025 - Kmtyw Social Education Communiversity!
              • Abibitumi Info Brochure
              • Terms and Conditions
              • Shipping and Return Policy
              • About Us
              News Feed
              Loading...

              Report

              There was a problem reporting this post.

              Member is harrassing another member
              Contains mature or sensitive content
              Infomation is misinforming and cannot be backed by research
              Activity post is offensive

              Block Member?

              Please confirm you want to block this member.

              You will no longer be able to:

              • See blocked member's posts
              • Mention this member in posts
              • Invite this member to groups
              • Message this member
              • Add this member as a connection

              Please note: This action will also remove this member from your connections and send a report to the site admin. Please allow a few minutes for this process to complete.

              Report

              You have already reported this .

              Insert/edit link

              Enter the destination URL

              Or link to existing content

                No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.