New Rockstar 2FA Phishing-as-a-Service Kit Aims at Microsoft 365 Accounts

Cybersecurity Threat Report: Rockstar 2FA Phishing Platform Uncovered

Recent findings by cybersecurity experts at Trustwave have revealed a sophisticated phishing-as-a-service (PhaaS) platform known as "Rockstar 2FA." Designed to compromise Microsoft 365 accounts, this platform leverages advanced tactics to bypass two-factor authentication (2FA), exposing business users to significant cybersecurity risks.

Rockstar 2FA has become a tool of choice for malicious actors, including less skilled attackers and script kiddies. By providing affordable subscriptions that require minimal technical expertise, it lowers the barrier for entry into phishing operations. This platform has already been implicated in a surge of adversary-in-the-middle (AiTM) attacks, which are particularly dangerous because they enable attackers to capture login credentials and session cookies from unsuspecting victims.

Since May 2024, Rockstar 2FA has been linked to over 5,000 phishing domains and a wide range of compromised accounts across multiple industries. Notably, the campaign appears to employ tactics such as cookie harvesting, fake login pages that closely imitate legitimate services, and antibot protections to deter security measures. The platform’s integration with Telegram bots and customizable user interfaces provides attackers with tools to enhance the efficiency of their phishing campaigns.

At its core, Rockstar 2FA builds on previous phishing kits, specifically the DadSec/Phoenix variants. Its operation includes sending deceptive emails that lead victims to a landing page masked by a Cloudflare Turnstile challenge, designed to filter out automated defenses. Once a user passes this challenge, they are met with a phishing page that looks like the genuine sign-in portal for Microsoft 365. The AiTM technique is employed to relay credentials to the authentic Microsoft service, allowing attackers to authenticate as the user and capture session cookies that grant unauthorized access even when multi-factor authentication is enabled.

The implications of this discovery are far-reaching, particularly as the Rockstar 2FA platform facilitates secondary attacks, including account takeover and business email compromise (BEC). Its extensive network has raised alarm bells, coinciding with a noticeable increase in activity, particularly during August 2024. As Trustwave researchers noted, the embedding of thematic elements—such as car-themed web pages—indicates a focused approach in targeting certain demographics and industries.

According to Zimperium’s Vice President of Product Strategy, Krishna Vishnubhotla, platforms like Rockstar 2FA signify a troubling trend in the cyber landscape. By simplifying access to phishing resources, they are driving an increase in attacks that leverage mobile devices and reduce the need for attackers to possess advanced technical skills.

The growing prevalence of phishing tactics highlights the importance of robust cybersecurity measures for businesses. To mitigate risks associated with platforms like Rockstar 2FA, companies are urged to implement comprehensive training programs, especially simulated phishing exercises, which have proved more effective at helping employees recognize and react to potential threats than standard security briefings.

This evolving threat landscape underscores the necessity for businesses to remain vigilant. Monitoring incoming communications for signs of phishing attempts, validating the authenticity of login pages, and educating staff on best practices for cybersecurity are essential steps in defending against these increasingly sophisticated attacks. With the integration of frameworks like MITRE ATT&CK, organizations can better understand the tactics, techniques, and procedures (TTPs) attackers employ, further fortifying their defenses against such threats.

Source