15.9 C
New York
Thursday, October 9, 2025

New VoidProxy phishing service targets Microsoft 365, Google accounts


New VoidProxy phishing service targets Microsoft 365, Google accounts

A newly found phishing-as-a-service (PhaaS) platform, named VoidProxy, targets Microsoft 365 and Google accounts, together with these protected by third-party single sign-on (SSO) suppliers equivalent to Okta.

The platform makes use of adversary-in-the-middle (AitM) ways to steal credentials, multi-factor authentication (MFA) codes, and session cookies in actual time.

VoidProxy was found by Okta Menace Intelligence researchers, who describe it as scalable, evasive, and complicated.

The assault begins with emails from a compromised accounts at electronic mail service suppliers, like Fixed Contact, Energetic Marketing campaign, and NotifyVisitors, whicch embrace shortened hyperlinks that ship recipients to phishing websites after a a number of redirections.

The malicious websites are hosted on disposable low-cost domains on .icu, .sbs, .cfd, .xyz, .prime, and .dwelling, that are protected by Cloudflare to cover their actual IPs.

Guests are first served a Cloudflare CAPTCHA problem to filter out bots and enhance the sense of legitimacy, whereas a Cloudflare Employee surroundings is used to filter site visitors and cargo pages.

The Cloudflare CAPTCHA step on the malicious site
The Cloudflare CAPTCHA step on the malicious web site
Supply: Okta

Chosen targets revceive a web page that mimics a Microsoft or Google login, whereas the remaining are funneled to a generic and “Welcome” web page that presents no menace.

If credentials are typed into the phishing kind, requests are proxied via VoidProxy’s adversary-in-the-middle (AitM) to Google or Microsoft servers.

Phishing pages served by VoidProxy
Phishing pages served by VoidProxy
Supply: Okta

Federated accounts like these utilizing Okta for SSO are redirected to a second-stage phishing web page impersonating Microsoft 365 or Google SSO flows with Okta. These requests have been proxied to Okta servers.

The service’s proxy server relays site visitors between the sufferer and the reputable service whereas capturing usernames, passwords, and MFA codes in transit.

When the reputable service points a session cookie, VoidProxy intercepts it and creates a replica that’s made accessible to the attackers proper on the platform’s admin panel.

VoidProxy's admin panel
VoidProxy’s admin panel
Supply: Okta

Okta famous that customers who had enrolled in phishing-resistant authentications like Okta FastPass have been protected against VoidProxy’s assault stream and acquired warnings about their account being below assault.

The researchers suggestions embrace limiting entry of delicate apps solely to managed gadgets, implementing risk-based entry controls, utilizing IP session binding for administrative apps, and forcing re-authentication for admins making an attempt delicate actions.

46% of environments had passwords cracked, almost doubling from 25% final 12 months.

Get the Picus Blue Report 2025 now for a complete have a look at extra findings on prevention, detection, and information exfiltration tendencies.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles