-
22,424
Abibisika (Black Gold) Points
It seems no one is safe in the unnatural Cyber world, and hopelessness seems to be spreading all over the world.
Never give up and TRUST NO ONE before verifying through their actions and ethical moral character.
We must be even more vigilant in the Internet digital social-media world as we should be with our relationships.
Astaroth Phishing Kit Bypasses 2FA Using Reverse Proxy Techniques
Astaroth is primarily distributed through Telegram and promoted across cybercrime forums and marketplaces.
Why Astaroth Stands Out
Astaroth’s real-time interception capability differentiates it from traditional phishing kits. Conventional kits capture login credentials but often fail to compromise 2FA-protected accounts. Astaroth, however, dynamically intercepts and forwards tokens, enabling attackers to gain access as soon as authentication occurs.
“Attackers now use man-in-the-middle reverse proxies to mimic legitimate sites, capturing usernames, passwords, 2FA tokens and session cookies instantly,” explained Jason Soroko, a senior fellow at Sectigo. “This method hijacks authenticated sessions before security can react, rendering 2FA ineffective.”
“Finally, Astaroth is primarily distributed through Telegram and promoted across cybercrime forums and marketplaces. Unfortunately, the accessibility of these platforms, combined with the anonymity they offer, makes it quite difficult for law enforcement to track and disrupt its sales.”
https://www.infosecurity-magazine.com/
infosecurity-magazine.com
Infosecurity Magazine - Strategy, Insight, Technology
The award winning online magazine dedicated to the strategy, insight and technology of information security
Paa Kwesi 27 and Tamara4 Comments-
As you said, “We must be even more vigilant in the Internet digital social-media world as we should be with our relationships.” …If 2FA is compromised, then what? Meda ase for sharing.
1 -
Yaw Pereko (edited)
22,424
Abibisika (Black Gold) Points
@ena_njideka
Thank you for your response and follow up question Njideka.
Here is my response and hopes it helps and clarify things better for all who wish to get secure and stay secure.
Having no Two-Fators at all is the least secure state you can be in today.
Login-password (First factor) and SMS or Email (second factor) authentication.
The attacker must have all of the above to take over your account, so this is why you should have a strong password that is not share across other accounts.
SMS text messaging (Second factor for account login access)
Possible ways to obtain your login credentials:
• SIM swapping (Redirect text messages)
• Physical theft – lost phone
• Phishing
• Telephone company breach
Steps to better protect yourself:
Contact your phone company and see if there is any higher security they can provide, such as having a PIN to make any changes on your phone accounts.
Take steps to prevent your phone number from being assigned to someone else.
1. Set up a “Authentication Application” link to your online accounts (Google authenticator or other similar tools).
2. Keep your phone secure at all times.
3. Don’t give or share your password with anyone.
4. Use a physical UBIKEY authentication (Great solution)
5. Using your third factor (Fingerprint or Face recognition)
6. Use your “Fourth factor” authentication which is your common sense
What are authentication factor challenges and solutions?
https://www.youtube.com/watch?v=2Iwm0-3JTIw -
Meda ase Brother Yaw for the informative follow-up info. UBIKEY/YUBIKEY- I had to go look that up.
But, the bottom line regarding 2FA is that it’s still a good means for securing your info, right?
1 -
22,424
Abibisika (Black Gold) Points
@ena_Njideka
Yes, Yes, Yes!!!!
1
-
