Skip to content
Achieving Computing Reliability

Achieving Computing Reliability

Securing Technology Networks

Primary Menu Achieving Computing Reliability

Achieving Computing Reliability

  • Advertise Here
  • Contact Us
  • Privacy Policy
  • Sitemap
  • Home
  • New Sneaky 2FA Phishing Kit with BitB Technique Attacking Users to Steal Microsoft Account Credentials
  • Information security techniques

New Sneaky 2FA Phishing Kit with BitB Technique Attacking Users to Steal Microsoft Account Credentials

admin November 21, 2025 0
New Sneaky 2FA Phishing Kit with BitB Technique Attacking Users to Steal Microsoft Account Credentials
New Sneaky 2FA Phishing Kit with BitB Technique Attacking Users to Steal Microsoft Account Credentials

The Sneaky2FA phishing service has recently added a dangerous new capability to its toolkit that makes stealing Microsoft account credentials even easier for attackers.

Push Security analysts and researchers have identified this threat operating in the wild, using a sophisticated technique called Browser-in-the-Browser (BITB) to trick users into handing over their login information.

This development represents a troubling evolution in phishing attacks that continues to threaten organizations worldwide.

Phishing-as-a-Service kits like Sneaky2FA have become increasingly popular in criminal circles because they lower the barrier to entry for anyone wanting to launch advanced attacks.

These platforms operate on Telegram with fully licensed, obfuscated versions of source code that attackers can deploy independently.

The competitive environment within the cybercriminal marketplace has driven innovation at an alarming pace, creating an arms race where attackers constantly develop new ways to bypass security controls and steal credentials.


google

Push Security analysts and researchers identified the latest Sneaky2FA variant after detecting unusual activity, suggesting the tool had gained new technical capabilities.

BITB functionality

The addition of BITB functionality represents a significant tactical shift for the platform, combining multiple layers of deception to maximize the chances of successful credential theft.

When users encounter this phishing attack, they first see what appears to be a legitimate Adobe Acrobat Reader document requiring them to sign in with their Microsoft account.

After clicking the sign-in button, an embedded browser window appears, displaying what looks like an authentic Microsoft login page.

The user is prompted to 'Sign in with Microsoft' as part of the phishing lure (Source - Push Security)
The user is prompted to ‘Sign in with Microsoft’ as part of the phishing lure (Source – Push Security)

However, this pop-up window is actually a fake contained within the attacker’s page. The browser window automatically adapts its appearance to match the visitor’s operating system and browser type, making the deception even more convincing to unsuspecting users.

The technical sophistication behind this attack involves multiple evasion mechanisms designed to prevent security tools from detecting it. Before users even see the phishing page, they must pass a Cloudflare Turnstile bot protection check.

The HTML and JavaScript code is heavily obfuscated to avoid pattern-matching detection. Additionally, the phishing domains use random 150-character URL paths and operate on compromised or old-looking websites.

Attackers frequently rotate these domains, using them briefly before abandoning them and deploying new ones, creating a constantly moving target for traditional defenses.

This innovation in phishing techniques demonstrates how attackers continue adapting their methods to bypass modern security controls.

Users should remain vigilant when encountering unexpected requests to verify their identity online, particularly when pop-up windows appear requesting sensitive credentials.

Organizations must implement detection systems capable of analyzing live pages in real time rather than relying solely on traditional defenses that examine domain reputation or static signatures.

Follow us on Google News, LinkedIn, and X to Get More Instant Updates, Set CSN as a Preferred Source in Google.


googlenews

link

Post navigation

Previous: TSX Pares Gains, Slips Into Negative Territory As Energy, Technology Stocks Decline
Next: Biometrics and digital identity in Africa

More Stories

New ‘Sryxen’ Stealer Bypasses Chrome Encryption via Headless Browser Technique
  • Information security techniques

New ‘Sryxen’ Stealer Bypasses Chrome Encryption via Headless Browser Technique

admin December 5, 2025 0
Hackers are Moving to “Living Off the Land” Techniques to Attack Windows Systems Bypassing EDR
  • Information security techniques

Hackers are Moving to “Living Off the Land” Techniques to Attack Windows Systems Bypassing EDR

admin December 3, 2025 0
Tomiris Hacker Group Added New Tools and Techniques to Attack Organizations Globally
  • Information security techniques

Tomiris Hacker Group Added New Tools and Techniques to Attack Organizations Globally

admin December 2, 2025 0

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • New funding to develop technology for first robots to weld in space
  • New ‘Sryxen’ Stealer Bypasses Chrome Encryption via Headless Browser Technique
  • “Leading with Hydrogen Energy, Contributing to Carbon Peaking and Carbon Neutrality” Themed Commentary Event Launched in Beijing
  • Demand for Biometric-as-a-Service in Japan | Global Market Analysis Report
  • Development of ‘OCTOID,’ a Soft Robot That Changes Color and Moves Like an Octopus

Archives

Categories

  • ! Без рубрики
  • Biometric Technology
  • Energy Technology
  • Information security techniques
  • Quantum Technology
  • Robotics Technology

Visit Us

Home Renew Pro

You may have missed

New funding to develop technology for first robots to weld in space
  • Robotics Technology

New funding to develop technology for first robots to weld in space

admin December 5, 2025 0
New ‘Sryxen’ Stealer Bypasses Chrome Encryption via Headless Browser Technique
  • Information security techniques

New ‘Sryxen’ Stealer Bypasses Chrome Encryption via Headless Browser Technique

admin December 5, 2025 0
“Leading with Hydrogen Energy, Contributing to Carbon Peaking and Carbon Neutrality” Themed Commentary Event Launched in Beijing
  • Energy Technology

“Leading with Hydrogen Energy, Contributing to Carbon Peaking and Carbon Neutrality” Themed Commentary Event Launched in Beijing

admin December 5, 2025 0
Demand for Biometric-as-a-Service in Japan | Global Market Analysis Report
  • Biometric Technology

Demand for Biometric-as-a-Service in Japan | Global Market Analysis Report

admin December 5, 2025 0
Development of ‘OCTOID,’ a Soft Robot That Changes Color and Moves Like an Octopus
  • Robotics Technology

Development of ‘OCTOID,’ a Soft Robot That Changes Color and Moves Like an Octopus

admin December 4, 2025 0
Copyright © All rights reserved. | CoverNews by AF themes.
Go to mobile version