DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Get Help
CyberMaterial
Home Alerts

Open-source AiTM phishing kit popular

March 16, 2023
Reading Time: 2 mins read
in Alerts

 

Microsoft Threat Intelligence has detected the increasing use of an open-source adversary-in-the-middle (AiTM) phishing kit developed by the emerging threat actor DEV-1101, which has been used in high-volume phishing campaigns. Such attacks circumvent multi-factor authentication protections, making them more effective.

DEV-1101 offers several phishing kits for purchase or rent, making it easier for criminals to launch a phishing campaign.

The open-source kit mimics Microsoft Office and Outlook and can be managed from mobile devices, with the latest update allowing server management through a Telegram bot.

A monthly license fee for the kit costs $300, with VIP licenses costing $1,000.

Furthermore, Microsoft has linked DEV-1101 to an activity cluster called DEV-0928, which is one of the threat actor’s prominent patrons.

A phishing campaign by this cluster has comprised over a million emails since September 2022.

The attack begins with document-themed email messages containing a link to a PDF document that leads the recipient to a login page masquerading as Microsoft’s sign-in portal, but not before the victim completes a CAPTCHA step. Microsoft warns that although AiTM attacks bypass MFA, organizations must adopt phishing-resistant authentication methods such as using FIDO2 security keys to block suspicious login attempts.

Phishing kits have become a part of the industrialization of the cybercriminal economy, making it easier for criminals to launch attacks.

The service-based economy of such offerings can also result in double theft, where the stolen credentials are sent to both the phishing-as-a-service provider and their customers. Microsoft recommends that organizations should educate their employees on phishing risks and invest in security awareness training.

Additionally, security teams should deploy automated detection and response tools that can spot and contain such attacks.

As phishing attacks continue to evolve, it is essential for organizations to stay up-to-date with the latest threats and protect their systems with advanced security measures.

The growing prevalence of AiTM attacks emphasizes the need for organizations to use phishing-resistant authentication methods and regularly conduct security assessments to identify and address vulnerabilities.

Read More

Tags: AlertsAlerts 2023cyber criminalsCyber securityHackersMarch 2023MicrosoftPhishingPhishing attacksThreats
0
VIEWS
ADVERTISEMENT

Related Posts

Unpatched IBM file transfer software at Risk

Unpatched IBM file transfer software at Risk

March 31, 2023
Osprey Pump Controller Vulnerabilities

Osprey Pump Controller Vulnerabilities

March 31, 2023
Super FabriXss vulnerability in Azure

Super FabriXss vulnerability in Azure

March 31, 2023
Tool for Cloud Credential Harvesting

Tool for Cloud Credential Harvesting

March 31, 2023

More Articles

Incidents

Ransomware Suspected in Wiltshire Farm Foods Attack

June 30, 2022
Incidents

Lehigh Valley Health Network Suffers Cyberattack by Russian Ransomware Group “Black Cat”

February 21, 2023
Meme

Front end vs Back end

November 12, 2020
Incidents

2 Latest Health Data Hacks Affect Over 200,000 Individuals

March 23, 2022

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.