Skip to content
Breach Spot
  • The Breach News
  • Check your exposure
REPORT BREACH
Breach SpotBreach Spot
  • The Breach News
  • Check your exposure
REPORT BREACH
Breach SpotBreach Spot

Hackers Target FIDO MFA Using Innovative Phishing Method

  • adminadmin
  • July 19, 2025
  • data-breaches

Cybercrime,
Fraud Management & Cybercrime,
Multi-factor & Risk-based Authentication

PoisonSeed Threat Actor Exploits Cross-Device Login and QR Codes to Deceive Users

Prajeet Nair (@prajeetspeaks) •
July 19, 2025

Hackers Exploit FIDO MFA With Novel Phishing Technique
Expel researchers have identified a novel phishing technique that circumvents FIDO2 security, a leading multifactor authentication method. (Image: Shutterstock)

In a notable advancement in cyber threats, Expel researchers have uncovered a sophisticated phishing technique employed by the cybercrime group PoisonSeed. This method specifically targets the FIDO2 physical security keys, which are renowned for offering robust multifactor authentication. The technique utilizes a cross-device sign-in feature along with QR codes to manipulate unsuspecting users.

Despite the integrity of the FIDO protocol itself remaining intact, the attackers have found a way to exploit this feature. According to a detailed report from Expel, PoisonSeed’s phishing campaign adeptly facilitates unauthorized access by convincing victims to engage with a fake login page masquerading as their organization’s Okta portal. Upon entering their credentials, victims inadvertently trigger a chain of events that generates a QR code intended to link their mobile device to the attacker’s session.

The involvement of QR codes adds a deceptive layer of complexity, seducing victims into thinking they are simply completing their normal sign-in procedures. “The hardware and cryptography remain sound, but the convenience features can be manipulated,” stated Jason Soroko, senior fellow at Sectigo.

The architecture of this attack cleverly circumvents the use of FIDO keys, allowing the attackers to execute a phishing email that redirects users to the fraudulent site. After victims enter their login details, the malicious site sends this information to a legitimate authentication service, which then generates a QR code for cross-device login.

As the process unfolds, victims are led to scan the QR code displayed on the phishing site with their mobile authenticator, inadvertently linking it to the attacker-managed session. This facilitates access to sensitive organizational resources without the physical interaction with the legitimate security key.

From a cybersecurity perspective, this incident highlights critical tactics associated with the MITRE ATT&CK framework, notably tactics such as initial access through phishing and techniques for persistence that allow attackers to maintain their foothold within compromised networks. The scenario also underscores the significant role of social engineering in modern cyber threats.

Expel emphasizes that while the attack was swiftly mitigated, it serves as a stark reminder that advanced adversaries can navigate through even the most fortified defenses by employing clever social engineering. Security teams are encouraged to meticulously monitor authentication logs for any anomalies, such as unexpected cross-device sign-in attempts or unfamiliar FIDO key registrations.

Ultimately, although the integrity of FIDO keys remains strong, organizations must remain vigilant and proactive in their security audits. As cybercriminals refine their tactics, understanding potential vulnerabilities in user workflows becomes essential for maintaining robust protection against sophisticated threats.

This incident underscores not only the complexity of modern cyber threats but also the imperative for business owners to continually fortify their cybersecurity strategies against evolving attack vectors.

Source link

Help Prevent Exploitation, Report Breaches

Help to prevent further data unauthorized access or potential exploitation. Protect others by sharing vital breach information. If you’ve discovered a new data breach

REPORT HERE
Trending now

"Fortinet" AI Android Apple artificial intelligence Artificial Intelligence & Machine Learning AT&T AWS CISA Cisco Cloudflare cloud security CrowdStrike cryptocurrency Cybercrime cybersecurity data breach data breaches data privacy data security encryption ESET Facebook FBI Fraud Management GitHub Google healthcare HIPAA Kaspersky machine learning Malware Mandiant Meta Microsoft Multi-Factor Authentication OpenAI Palo Alto Networks phishing ransomware Risk Management Salesforce Telegram Trend Micro Windows

Sector alert bulletin

Subscribe to your sector-specific insight newsletter to stay updated on potential data breaches and ongoing cyber-attacks targeting your industry

Stay informed and prepared against emerging security threats.

SUSCRIBE NOW

Related Posts

Microsoft Announces Fix for 80 Security Vulnerabilities, Including Critical SMB Privilege Escalation and Azure CVSS 10.0 Issues

On September 10, 2025, Microsoft released patches for 80 security flaws across its software. This update includes one vulnerability that had already been disclosed publicly. Among these, eight are classified as Critical, while 72 are deemed Important. Fortunately, none were exploited in the wild as zero-day vulnerabilities. Similar to the previous month, 38 flaws are linked to privilege escalation, followed by 22 related to remote code execution, 14 concerning information disclosure, and 3 classified as denial-of-service. “For the third time this year, Microsoft has addressed more privilege escalation vulnerabilities than remote code execution issues,” noted Satnam Narang, Senior Staff Research Engineer at Tenable. “Almost half (47.5%) of the vulnerabilities this month are related to privilege escalation.” This patch release also includes updates to 12 vulnerabilities in Microsoft’s Chromium-based Edge browser since August 2025’s Patch Tuesday.

  • April 9, 2026

Unlocking Boardroom Communication: Empowering CISOs to Articulate Business Impact

 
Sep 11, 2025
Continuous Threat Exposure Management

CISOs possess deep expertise in their domain—they are well-versed in the threat landscape, capable of building robust and cost-effective security systems, adept at staffing, navigating compliance intricacies, and managing risk. But a recurring challenge arises in discussions with these security leaders: how can they effectively convey the implications of risk to business decision-makers?

Boards focus on how risk influences revenue, governance, and growth, often showing little interest in detailed vulnerability lists or technicalities. When the narrative becomes overly technical, even critical initiatives can stall and miss funding.

CISOs must learn to translate technical challenges into business-friendly language, fostering trust, gaining support, and demonstrating how security decisions tie directly to sustainable growth. This urgent need to bridge the communication divide between CISOs and Boards has driven us to establish a new framework for CISO engagement.

  • April 9, 2026

Exploitation of SonicWall SSL VPN Vulnerability and Misconfigurations by Akira Ransomware Group on the Rise

September 11, 2025

Cybersecurity threats linked to the Akira ransomware group have intensified, specifically targeting SonicWall devices for initial breaches. Rapid7 has reported a notable increase in attacks on SonicWall appliances, coinciding with heightened Akira ransomware activity noted since late July 2025. SonicWall recently identified that these SSL VPN attacks exploit a year-old security vulnerability (CVE-2024-40766, CVSS score: 9.3) where local user passwords remained unchanged during migration. “We are seeing a surge in attempts by threat actors to brute-force user credentials,” the company commented. To mitigate risks, they advise enabling Botnet Filtering to block known threats and implementing Account Lockout policies. SonicWall also urged users to review LDAP SSL VPN Default User Groups, highlighting that misconfigurations could represent a “critical weak point.”

  • April 9, 2026

Senator Wyden Calls for FTC Investigation into Microsoft Over Ransomware-Related Cybersecurity Failures

U.S. Senator Ron Wyden is urging the Federal Trade Commission (FTC) to investigate Microsoft for what he describes as “gross cybersecurity negligence” that has facilitated ransomware attacks on critical U.S. infrastructure, particularly targeting healthcare networks. In a detailed four-page letter to FTC Chairman Andrew Ferguson, Wyden warned that Microsoft’s lax cybersecurity practices, combined with its near-monopoly in the enterprise operating system market, create a significant national security risk, making further attacks likely. He likened Microsoft’s behavior to that of “an arsonist selling firefighting services to their victims.” This request follows new revelations from the healthcare provider Ascension, which experienced a devastating ransomware attack last year, compromising personal and medical data of nearly 5.6 million individuals.

  • April 9, 2026

Real-time data breach monitoring by scanning public databases, criminal forums, and online markets to detect exposed credentials and sensitive data.

Industries
  • Enterprise Security Teams
  • Financial Services
  • Retail and E-commerce
  • Legal Services
  • Law Enforcement
Commonly Used For
  • Penetration Testing
  • M&A Risk Research
  • Vulnerability Assessment
  • Red Team Operation
  • Enterprise Security
Contact Us

Need help or have a question?

Email: info@breachspot.com
Phone: +1 (914) 2943243

Copyright © 2026 - Breachspot, Security Breaches Spotted