Phishing, Identity, Threat Intelligence
Bogus Microsoft ADFS login pages leveraged for widespread credential theft
(Adobe Stock Images)
Hackread reports that more than 150 organizations worldwide, most of which are in the U.S., have been subjected to a new ongoing phishing campaign utilizing fraudulent Microsoft Active Directory Federation Services login pages to facilitate credential exfiltration. Intrusions part of the campaign, which has been primarily targeted at the education sector, commenced with the distribution of notification-spoofing phishing emails deceiving recipients into clicking a link that redirects to a seemingly legitimate ADFS portal seeking to compromise targets' second-factor authentication, according to an analysis from Abnormal Security. Attackers further establish the legitimacy of the operation by redirecting targets to the organization's ADFS login page before proceeding with account takeover attacks exploiting VPNs. "This approach leverages nuanced psychological tactics to exploit human vulnerabilities and reinforce a false sense of legitimacy," said the report. Such ADFS-exploiting attack was regarded to be sophisticated by KnowBe4's Roger Grimes, who urged the implementation of phishing-resistant multi-factor authentication to prevent potential compromise.
An In-Depth Guide to Identity
Get essential knowledge and practical strategies to fortify your identity security.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds