Astaroth is a new and highly sophisticated phishing kit that has emerged as a major threat in the cybersecurity landscape by effectively bypassing two-factor authentication (2FA) mechanisms. First introduced on cybercrime forums in January 2025, the kit uses advanced techniques such as session hijacking and real-time credential interception. It targets accounts on platforms like Gmail, Yahoo, Office 365, and other third-party logins, making it a serious concern for both individual users and organizations that rely on these services for secure access.
Unlike traditional phishing kits that rely on static fake login pages to collect user credentials, Astaroth operates using an evilginx-style reverse proxy to intercept data in real-time. This approach allows the phishing kit to act as a man-in-the-middle between the user and the legitimate login page, enabling it to capture not only usernames and passwords but also session cookies and 2FA tokens, such as SMS or app-generated codes.
The kit’s ability to intercept and forward these credentials to the legitimate server ensures that victims remain unaware of the attack, as there are no security warnings displayed during the login process.
The sophistication of Astaroth extends beyond credential theft. Its ability to hijack authenticated sessions in real-time poses a serious risk by enabling attackers to impersonate victims without requiring further credentials. This technique effectively bypasses the need for re-authentication, allowing cybercriminals to gain full access to compromised accounts. Astaroth’s real-time notifications, delivered via web panels or Telegram alerts, allow attackers to act immediately once they have successfully intercepted the required data, making it a fast and efficient tool for cybercrime.
Astaroth is marketed to cybercriminals for $2,000 and includes six months of updates and support. The phishing kit comes with a range of features, including bulletproof hosting, which resists law enforcement takedown attempts, and techniques to bypass protections like reCAPTCHA and BotGuard. Its availability and transparent marketing make it accessible not only to experienced cybercriminals but also to newcomers. As phishing attacks like Astaroth become more sophisticated, the need for enhanced cybersecurity measures, real-time threat detection, and user education becomes increasingly critical to defend against these evolving threats.