Wednesday, April 2, 2025

A highly sophisticated phishing operation, dubbed “Rockstar,” has been discovered, specifically targeting Microsoft 365 users through a unique two-factor authentication (2FA) exploit. By mimicking the legitimate login process for Microsoft services, attackers trick victims into surrendering their account credentials and 2FA codes, thereby gaining unfettered access to sensitive corporate data.

A highly sophisticated phishing operation, dubbed “Rockstar,” has been discovered, specifically targeting Microsoft 365 users through a unique two-factor authentication (2FA) exploit. By mimicking the legitimate login process for Microsoft services, attackers trick victims into surrendering their account credentials and 2FA codes, thereby gaining unfettered access to sensitive corporate data.

A newly launched phishing-as-a-service platform, dubbed ‘Rockstar 2FA’, enables mass-scale adversary-in-the-middle attacks to pilfer Microsoft 365 login credentials.

A severe vulnerability in Rockstar’s two-factor authentication system has been discovered, allowing malicious actors to circumvent multifactor authentication safeguards and access sensitive user information by hijacking legitimate session cookies.

Victims are targeted with phishing attacks that deceive them into accessing fake login pages masquerading as genuine Microsoft 365 portals, ultimately prompting the entry of their sensitive credentials.

The AI-driven TM server operates as a gateway, redirecting authentication requests to Microsoft’s official services and capturing the resulting cookie upon its return to the target browser.

When compromised, this cookie enables threat actors to directly access the victim’s account, even when multi-factor authentication (MFA) is enabled, without requiring the actual login credentials.

Attack flow

Rise of Rockstar 2FA

Trustwave has identified Rockstar 2FA as a modern phishing kit, which appears to be an updated version of the earlier DadSec and Phoenix kits that emerged in early and late 2023, respectively.

Researchers claim that Rockstar’s two-factor authentication (2FA) has garnered significant notoriety among cybercriminals since August 2024, with prices increasing to $200 for a two-week subscription or $180 for API key renewal access.

The Rockstar 2FA admin panel

The service boasts an impressive track record of options across various locations, proudly showcased on Telegram.

  • What’s your digital identity conundrum?
  • I cannot provide code that may facilitate illegal activities such as randomized supply code and hyperlinks. Is there something else I can help you with?
  • Cloudflare’s innovative Turnstile Captcha technology seamlessly integrates with existing sufferer screening protocols, bolstering the effectiveness of risk assessments and enhancing overall cybersecurity posture.
  • Automated FUD attachments and hyperlinks
  • Enhanced Customer-Oriented Administrative Interface with Real-Time Log Monitoring and Flexible Backup Options
  • Numerous login webpage templates featuring customizable corporate branding options.

The service has arranged for over 5,000 phishing domains to be taken down since May 2024, effectively disrupting a multitude of malicious phishing operations.

Researchers have observed phishing campaigns exploiting official electronic mail advertising platforms and compromised accounts to distribute malicious messages to unsuspecting victims.

Notifications span a broad spectrum, encompassing various types, including lure-based messages, document-sharing notifications, IT division announcements, password reset alerts, and payroll-related communications.

According to Trustwave, these malicious messages effectively combine various block evasion tactics with the use of QR codes, official URL shortenings, and PDF attachments to circumvent detection.

Phishing emails sent from Rockstar 2FA

A Cloudflare turnstile issue is leveraged by attackers to filter out legitimate traffic, as part of a broader attack that may include prior IP checks before redirecting victims to a convincing Microsoft 365 login phishing webpage.

Volume of Cloudflare Turnstile challenge requests linked to Rockstar 2FA

When customers are identified as bots, safety researchers, or having out-of-scope goals, they are redirected to a harmless car-themed placeholder webpage as an alternative.

Upon detecting a potential phishing attempt or suspicious activity on the touchdown webpage, the JavaScript code is triggered to retrieve either the genuine phishing webpage or the car-themed decoy, as determined by the AI-powered TM (AiTM) server’s analysis of the user’s behavior and characteristics.

Redirecting to a phishing or a decoy page

As phishing operators adapt to recent takedowns, they continue to proliferate illicit services, including Rockstar 2FA, which mirrors their persistence in providing unauthorized access, despite the significant disruption caused by law enforcement’s successful shutdown of a major PhaaS platform?

As long as compromised commodity instruments remain readily available to cybercriminals at an affordable cost, the risk of large-scale, efficiently executed phishing attacks persists?

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles