Skip to content
Breach Spot
  • The Breach News
  • Check your exposure
REPORT BREACH
Breach SpotBreach Spot
  • The Breach News
  • Check your exposure
REPORT BREACH
Breach SpotBreach Spot

Phishers Discover a Method to Downgrade FIDO MFA Instead of Bypassing It

  • adminadmin
  • July 18, 2025
  • cyber-attacks

Researchers have recently uncovered a sophisticated phishing attack that effectively circumvents a multifactor authentication (MFA) mechanism based on the FIDO (Fast Identity Online) standard, which is increasingly being adopted across various platforms and enterprises. If verified, this development poses significant concerns, as FIDO is generally perceived as robust against credential phishing attempts.

The attack was detailed in a blog post published by security firm Expel, which attributes the tactic to a group identified as PoisonSeed. Upon review, it appears this threat does not entirely bypass FIDO protections, at least in the conventional sense used by cybersecurity experts. Instead, the attack appears to weaken the MFA process by downgrading it to a less secure, non-FIDO-based method, thus more accurately described as a FIDO downgrade attack.

The initial phase of this novel attack technique begins with an email that directs recipients to a counterfeit login page masquerading as an Okta interface, a popular authentication provider. Victims are urged to input their valid usernames and passwords. By falling for this ploy, individuals unwittingly assist the attackers in clearing an essential barrier to unauthorized access to their Okta accounts.

FIDO was explicitly designed to mitigate such scenarios by mandating additional authentication factors, often provided through a security key. This key can take the form of a passkey or a physical device like a YubiKey or even a smartphone. The authentication process requires this passkey to utilize a unique cryptographic key embedded in the device. This key signs a challenge issued by the site attempting the login—in this case, Okta.

Additionally, users can engage a cross-device sign-in feature when a passkey is not available on the device in use. This allows them to leverage a passkey stored on another device, typically a smartphone. The login site generates a QR code that users scan with their phones, enabling the normal FIDO MFA process to proceed without hindrance.

Identifying the potential tactics and techniques used in this attack through the MITRE ATT&CK framework reveals key components of adversary behavior. The initial access vector, employed by PoisonSeed, reflects typical phishing approaches aiming to harvest user credentials. The subsequent compromise of the MFA process could involve tactics categorized under “Credential Dumping,” where attackers gain essential access using harvested login information and subsequently bypass additional security layers.

As malicious actors continue to refine their techniques, businesses must remain vigilant in implementing and updating their security measures, particularly those involving MFA systems. Understanding the evolving landscape of threats is crucial for safeguarding sensitive data and maintaining trust in digital transactions.

Source

Help Prevent Exploitation, Report Breaches

Help to prevent further data unauthorized access or potential exploitation. Protect others by sharing vital breach information. If you’ve discovered a new data breach

REPORT HERE
Trending now

"Fortinet" AI Apple artificial intelligence Artificial Intelligence & Machine Learning AT&T Change Healthcare CISA Cisco cloud security compliance CrowdStrike cryptocurrency Cybercrime cybersecurity data breach data breaches data privacy data security encryption Facebook FBI Fraud Management Generative AI GitHub Google healthcare HIPAA identity theft LockBit machine learning Malware Meta Microsoft Multi-Factor Authentication OpenAI Palo Alto Networks phishing ransomware Salt Typhoon Scattered Spider Signal T-Mobile Telegram Verizon

Sector alert bulletin

Subscribe to your sector-specific insight newsletter to stay updated on potential data breaches and ongoing cyber-attacks targeting your industry

Stay informed and prepared against emerging security threats.

SUSCRIBE NOW

Related Posts

Study Reveals Over 750 US Hospitals Experienced Disruptions During Last Year’s CrowdStrike Outage

  • July 19, 2025

How China’s Patriotic ‘Honkers’ Transformed into Elite Cyber Spies

  • July 19, 2025

Data Exposure at Adoption Agency Unveils Sensitive Information About Children and Parents

  • July 18, 2025

Chinese Salt Typhoon Breached US National Guard Network for Months

  • July 18, 2025

Real-time data breach monitoring by scanning public databases, criminal forums, and online markets to detect exposed credentials and sensitive data.

Industries
  • Enterprise Security Teams
  • Financial Services
  • Retail and E-commerce
  • Legal Services
  • Law Enforcement
Commonly Used For
  • Penetration Testing
  • M&A Risk Research
  • Vulnerability Assessment
  • Red Team Operation
  • Enterprise Security
Contact Us

Need help or have a question?

Email: [email protected]
Phone: +1 (914) 2943243

Copyright © 2025 - Breachspot, Security Breaches Spotted