New 'Sneaky 2FA' Phishing Kit Targets Microsoft 365 Accounts with 2FA Code Bypass

February 1, 2025~Written by Syarif
New 'Sneaky 2FA' Phishing Kit Targets Microsoft 365 Accounts with 2FA Code Bypass
Cybersecurity researchers have uncovered a new adversary-in-the-middle (AitM) phishing kit, dubbed Sneaky 2FA, designed to steal Microsoft 365 credentials and two-factor authentication (2FA) codes. Detected by Sekoia in December 2024, the kit is distributed as a phishing-as-a-service (PhaaS) called Sneaky Log via a Telegram bot. Nearly 100 domains hosting Sneaky 2FA phishing pages have been identified.
The phishing campaigns lure victims with fake payment receipt emails containing QR codes that lead to fraudulent Microsoft login pages. These pages are hosted on compromised WordPress sites and feature tactics to bypass bots and analysis, including traffic filtering and IP checks. Only licensed users of Sneaky 2FA, which costs $200 per month, can conduct phishing campaigns.
Investigations suggest ties to the W3LL Store phishing syndicate, known for similar tools like W3LL Panel. Sneaky 2FA’s techniques, including unique User-Agent transitions during authentication, help identify and thwart the phishing kit.