
Report Identifies Rise in Phishing-as-a-Service Attacks — Campus Technology
Report Identifies Rise in Phishing-as-a-Service Attacks
Cybersecurity researchers at Trustwave are warning about a surge in malicious e-mail campaigns leveraging Rockstar 2FA, a phishing-as-a-service (PhaaS) toolkit designed to steal Microsoft 365 credentials.
The tool poses a significant threat, bypassing multifactor authentication (MFA) protections, even for users with enhanced security measures in place. These campaigns have been aimed at popular services, including Microsoft OneDrive, OneNote, Dynamics 365 Customer Voice, Atlassian Confluence, and Google Docs Viewer, to host malicious links or redirect users to phishing sites.
“This campaign employs an AiTM attack, allowing attackers to intercept user credentials and session cookies, which means that even users with multifactor authentication (MFA) enabled can still be vulnerable,” wrote Diana Solomon and John Kevin Adriano at security firm Trustwave.”Microsoft user accounts are the prime target of these campaigns, as target users will be redirected to landing pages designed to mimic Microsoft 365 (O365) login pages.”
Rockstar 2FA represents a more advanced iteration of the DadSec, or Phoenix, phishing kit, researchers said. Microsoft has identified the cybercriminal group behind the toolkit as Storm-1575. Marketed on platforms such as ICQ, Telegram, and Mail.ru, the phishing-as-a-service offering is available through a subscription model.
The toolkit is designed to bypass multifactor authentication (MFA) and harvest session cookies, while incorporating features to evade detection, such as antibot measures and fully undetectable phishing links. It also allows users to customize phishing themes and integrate their campaigns with Telegram bots, making it a malicious tool that needs very little technical knowledge.
The phishing kit evades antispam filters by using obfuscated links hosted on reputable platforms such as Microsoft OneDrive, Google Docs Viewer, and Atlassian Confluence. It also incorporates Cloudflare Turnstile antibot checks to prevent automated analysis of its phishing pages.
Once victims are redirected, they encounter fake login portals designed to mimic legitimate sites. Credentials entered on these pages are captured and sent to an AiTM server, where attackers can use the stolen information to hijack accounts by accessing session cookies.
In one example, Trustwave outlined an attack campaign against Microsoft OneNote users, where a seemingly legitimate e-mail is sent to victims. Here’s how it works:
The text seen in the e-mail body is actually contained in an image. The image is anchored with a link to a OneNote document hosted on the 1drv[.]ms domain. This image-based approach helps attackers evade text-based detection mechanisms. This is a common technique that is still seen in phishing samples today.
Users will be redirected to a OneNote page entitled “Complete Document for Review”. This webpage displays an Adobe PDF logo and a text hyperlink that leads to the phishing landing page.
Trustwave’s conclusion found that the rise of PhaaS platforms like Rockstar 2FA demonstrates the increasing sophistication and accessibility of phishing campaigns. These tools are enabling widespread credential theft and subsequent attacks, such as business e-mail compromise.
According to the security firm, organizations are encouraged to:
- Strengthen e-mail filtering and detection systems.
- Educate employees on phishing tactics and social engineering.
- Use behavioral analytics to identify unusual account activity.
For more information, visit the Trustwave blog.
Source link




1 Comment
Equilibrado de piezas
El equilibrado es una etapa esencial en las tareas de mantenimiento de maquinaria agricola, asi como en la produccion de ejes, volantes, rotores y armaduras de motores electricos. El desequilibrio genera vibraciones que incrementan el desgaste de los rodamientos, generan sobrecalentamiento e incluso llegan a causar la rotura de componentes. Con el fin de prevenir fallos mecanicos, es fundamental identificar y corregir el desequilibrio de forma temprana utilizando tecnicas modernas de diagnostico.
Metodos principales de equilibrado
Existen varias tecnicas para corregir el desequilibrio, dependiendo del tipo de pieza y la magnitud de las vibraciones:
El equilibrado dinamico – Se aplica en elementos rotativos (rotores y ejes) y se realiza en maquinas equilibradoras especializadas.
El equilibrado estatico – Se usa en volantes, ruedas y otras piezas donde basta con compensar el peso en un solo plano.
La correccion del desequilibrio – Se realiza mediante:
Taladrado (eliminacion de material en la zona mas pesada),
Colocacion de contrapesos (en ruedas y aros de volantes),
Ajuste de masas de balanceo (por ejemplo, en ciguenales).
Diagnostico del desequilibrio: ?que equipos se utilizan?
Para detectar con precision las vibraciones y el desequilibrio, se emplean:
Equipos equilibradores – Permiten medir el nivel de vibracion y definen con precision los puntos de correccion.
Equipos analizadores de vibraciones – Registran el espectro de oscilaciones, identificando no solo el desequilibrio, sino tambien fallos adicionales (como el desgaste de rodamientos).
Sistemas laser – Se emplean para mediciones de alta precision en mecanismos criticos.
Especial atencion merecen las velocidades criticas de rotacion – condiciones en las que la vibracion se incrementa de forma significativa debido a fenomenos de resonancia. Un equilibrado correcto previene danos en el equipo bajo estas condiciones.