- Impact
- 46
Sneaky 2FA, believed to be sold via the phishing-as-a-service (PhaaS) business model, recently figured in an adversary-in-the-middle (AitM) attack targeting Microsoft 365 users. Marketed as Sneaky Log by a full-featured bot on Telegram, Sneaky 2FA reportedly used fake Microsoft authentication pages with automatically filled-in email address fields to add to its sense of authenticity. . . .
Read full post here:
https://circleid.com/posts/sneaking-a-peek-into-the-inner-dns-workings-of-sneaky-2fa
Read full post here:
https://circleid.com/posts/sneaking-a-peek-into-the-inner-dns-workings-of-sneaky-2fa















