March 27, 2025
Artificial Intelligence

Gmail And Outlook 2FA Warning—Do Not Use This Sign-In

  • February 15, 2025
  • 0

New email account warning getty For the billions logging into Gmail and Outlook accounts daily, as well as other major email platforms including AOL and Yahoo, there’s a

Gmail And Outlook 2FA Warning—Do Not Use This Sign-In


For the billions logging into Gmail and Outlook accounts daily, as well as other major email platforms including AOL and Yahoo, there’s a dangerous new attack to worry about. If you think 2FA always keeps you safe, think again. This attack “bypasses two-factor authentication through session hijacking and real-time credential interception.” The dangerous sign-in page you need to avoid is shown below.

The warning comes courtesy of SlashNext, which has just published a report into a new phishing kit dubbed Astaroth. On an infected device, this deploys a man-in-the-middle attack between user and legitimate account sign-in page, “capturing login credentials, tokens, and session cookies in real time, effectively bypassing 2FA.”

ForbesNSA Warns iPhone Users—Disable Wi-Fi Settings Now

This kit was first advertised last month, and “distinguishes itself by not only intercepting login credentials but also by rapidly capturing 2FA authentication tokens and session cookies as they are generated.” The reason this is so dangerous is that its “real-time interception, enabled by a reverse proxy mechanism, allows attackers to bypass 2FA defenses with remarkable speed and precision.”

SlashNext warns that “in contrast, traditional phishing kits typically rely on static fake login pages that capture only primary credentials, often leaving the 2FA layer intact. By dynamically intercepting all authentication data in real time, Astaroth significantly raises the bar, rendering conventional phishing methods and their inherent security measures largely ineffective.”

As ever, it all starts with a link and a click. Which means it’s completely avoidable if you follow the basic guidelines around not clicking links in emails, messages or on social media posts. This link will redirect you to a malicious server “which mirrors the target domain’s appearance and functionality while relaying traffic between the victim and the legitimate login page.” If you select Google, that’s the sign-in page you’re served.

You will see no security warnings and will assume you’re on the legitimate website, the MITM attack intercepts your data and feeds the real webpage behind the scenes. “The user agent and IP address allow attackers to replicate the victim’s session environment and reduce detection risks during login.”

The sense of security you will take from 2FA is completely undermined by this attack. “Because 2FA is always involved (e.g., via SMS codes, authenticator apps, or push notifications), Astaroth automatically captures the entry of the 2FA token in real time. It also ensures that any token entered by the victim is intercepted immediately—the attacker is instantly alerted through a web panel interface and Telegram notifications.”

2FA has other issues, which is why passkeys are catching on so quickly. But this attack also steals session cookies from your browser, which can replicate your authorized session on an attacker’s device. While there are updates in place to tackle such session cookie theft, it remains a huge issue.

ForbesSamsung’s Galaxy S24 Decision—Leak ‘Confirms’ Bad News

This phishing kit in inexpensive and now available. “For $2,000, users receive six months of continuous updates, gaining access to the latest improvements and bypass techniques. To build trust, Astaroth offers testing before purchase, showcasing its legitimacy on cybercrime marketplaces.”

Remember, while many phishing lures remain rudimentary, AI is changing this and they will become harder to detect. The advice is clear. Do not click links. Do not use sign-in popups for the platforms you use except through usual login methods. If you need to revalidate, navigate to a sign-in page through usual channels, never through a link unless it’s one you’ve just requested from a usual channel.



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *