home.social

#multi-factor-authentication — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #multi-factor-authentication, aggregated by home.social.

fetched live
  1. Device Code Phishing is an Evolution in Identity Takeover

    Device code phishing attacks have exploded across the threat landscape, with new toolkits emerging weekly. This surge coincides with publicly released criminal toolkits and multiple phishing-as-a-service offerings like EvilTokens and Tycoon. Threat actors abuse the OAuth 2.0 device authorization grant flow to compromise Microsoft 365 and other enterprise accounts by tricking users into authorizing malicious applications. Current implementations use on-demand code generation, addressing the 15-minute expiration limitation of previous techniques. Most activity appears to be generated using AI-based coding techniques. Successful attacks lead to full account takeover, data theft, business email compromise, and potential ransomware deployment. The technique represents the natural evolution of credential phishing as organizations improve their defenses against traditional multifactor authentication bypass methods.

    Pulse ID: 6a05af080ae591ea2bf00e87
    Pulse Link: otx.alienvault.com/pulse/6a05a
    Pulse Author: AlienVault
    Created: 2026-05-14 11:16:24

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #DataTheft #Email #InfoSec #Microsoft #MultiFactorAuthentication #OTX #OpenThreatExchange #Phishing #RAT #RansomWare #bot #AlienVault

  2. Breaking the code: Multi-stage 'code of conduct' phishing campaign leads to AiTM token compromise

    A sophisticated large-scale credential theft campaign targeted over 35,000 users across 13,000 organizations, primarily in the United States, between April 14-16, 2026. Attackers distributed fully authenticated emails from legitimate services using code of conduct-themed lures with polished HTML templates. The multi-stage attack chain included PDF attachments with embedded links, multiple CAPTCHA challenges, and intermediate staging pages designed to appear legitimate while filtering automated defenses. Recipients were directed through several layers ultimately leading to an adversary-in-the-middle phishing flow that proxied authentication sessions and captured tokens, bypassing non-phishing-resistant multifactor authentication. The campaign broadly impacted Healthcare, Financial services, Professional services, and Technology industries, using social engineering techniques that created urgency through time-bound prompts and concerning accusations.

    Pulse ID: 69f8f1230f0bda494499b941
    Pulse Link: otx.alienvault.com/pulse/69f8f
    Pulse Author: AlienVault
    Created: 2026-05-04 19:18:59

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #AdversaryInTheMiddle #AitM #CAPTCHA #CyberSecurity #Email #HTML #Healthcare #InfoSec #MultiFactorAuthentication #OTX #OpenThreatExchange #PDF #Phishing #SocialEngineering #UnitedStates #bot #AlienVault

  3. Imagine trusting a nursery's digital platform and finding out over 1,000 kids' sensitive data was stolen—and hackers even made threats. What went wrong, and what can every organization learn from this cyber breach?

    thedefendopsdiaries.com/cybers

    #cybersecurity
    #databreach
    #incidentresponse
    #dataprotection
    #multifactorauthentication

  4. DraftKings just faced a breach—not from some sci-fi hack but through the all-too-common tactic of credential stuffing. Reusing passwords made it easy for attackers. How secure are your accounts? Dive in to learn the warning signs and how to protect yourself.

    thedefendopsdiaries.com/creden

    #credentialstuffing
    #databreach
    #passwordsecurity
    #multifactorauthentication
    #cybersecuritytips

  5. A passkey is supposed to replace a password. It's not supposed to be an additional factor.

    #Passkeys #MultiFactorAuthentication