Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New BlackForce Phishing Kit Lets Attackers Steal Credentials Using MitB Attacks and Bypass MFA

Posted on December 12, 2025December 12, 2025 By CWS

A classy phishing device referred to as BlackForce has emerged as a severe risk to organizations worldwide.

First noticed in August 2025, this professional-grade equipment permits criminals to steal login info and bypass multi-factor authentication utilizing superior Man-in-the-Browser strategies.

The device is actively being offered on Telegram boards for between 200 to 300 euros, making it accessible to a variety of risk actors.

BlackForce has already been used to focus on main manufacturers together with Disney, Netflix, DHL, and UPS, demonstrating its effectiveness in real-world assaults.

The phishing equipment represents a big evolution in credential theft capabilities. What makes BlackForce significantly harmful is its skill to carry out Man-in-the-Browser assaults, which permit attackers to intercept and manipulate communications between victims and legit web sites in actual time.

This system permits criminals to seize one-time authentication codes that victims obtain by way of SMS, e mail, or authenticator apps, successfully rendering multi-factor authentication ineffective.

At the very least 5 distinct variations of BlackForce have been documented, suggesting the attackers are repeatedly bettering their device.

Zscaler safety analysts recognized and analyzed the BlackForce phishing equipment after discovering suspicious patterns in phishing campaigns.

BlackForce phishing web page that hijacks an SMS code despatched to the sufferer (Supply – Zscaler)

The researchers discovered that the malicious domains used JavaScript information with cache-busting hashes to power browsers to obtain the most recent malicious code.

Notably, over 99 p.c of the malicious JavaScript consists of legit React and React Router code, giving the device a legit look that helps it evade preliminary detection.

Superior MitB Assault Mechanism

The core energy of BlackForce lies in its subtle multi-stage assault chain. When a sufferer clicks a phishing hyperlink, they encounter a legitimate-looking login web page that seems genuine to the bare eye.

Assault chain (Supply – Zscaler)

As soon as they enter their credentials, the attacker instantly receives a real-time alert by way of a command-and-control panel and positive factors entry to a Telegram channel with the stolen info.

The attacker’s view of the exfiltrated knowledge being despatched to Telegram (Supply – Zscaler)

The attacker then makes use of the credentials to log into the true service, triggering the MFA authentication immediate.

Right here, BlackForce demonstrates its technical prowess by deploying a pretend MFA web page immediately into the sufferer’s browser.

BlackForce management panel for model 3 (Supply – Zscaler)

The sufferer unknowingly enters their authentication code into this fraudulent web page, which is immediately captured by the attacker and used to finish the account takeover.

Newer variations of BlackForce use session storage to keep up state throughout web page reloads, making assaults extra resilient.

The device additionally implements sturdy anti-analysis filters that block safety researchers and automatic scanners utilizing Person-Agent parsing and ISP blocklists.

Organizations ought to implement zero-trust safety architectures to reduce the injury from such subtle assaults.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attackers, Attacks, BlackForce, Bypass, Credentials, Kit, Lets, MFA, MitB, Phishing, Steal

Post navigation

Previous Post: Policy, Isolation, and Data Controls That Actually Work
Next Post: Microsoft Bug Bounty Program Expanded to Third-Party Code

Related Posts

Hackers Using Calendly-Themed Phishing Attack to Steal Google Workspace Account Cyber Security News
A Multi-Stage Phishing Kit Using Telegram to Harvest Credentials and Bypass Automated Detection Cyber Security News
North Korean Kimsuky and Lazarus Join Forces to Exploit Zero-Day Vulnerabilities Targeting Critical Sectors Worldwide Cyber Security News
Millions of Dell Laptops Vulnerable to Device Takeover and Persistent Malware Attacks Cyber Security News
New Fully Undetectable FUD Android RAT Hosted on GitHub Cyber Security News
Cisco Catalyst Center Vulnerability Let Attackers Escalate Priveleges Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale
  • New AiTM Attack Campaign That Bypasses MFA Targeting Microsoft 365 and Okta Users
  • Gladinet CentreStack Flaw Exploited to Hack Organizations
  • Fieldtex Data Breach Impacts 238,000
  • CyberVolk Hackers Group With New VolkLocker Payloads Attacks both Linux and Windows Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale
  • New AiTM Attack Campaign That Bypasses MFA Targeting Microsoft 365 and Okta Users
  • Gladinet CentreStack Flaw Exploited to Hack Organizations
  • Fieldtex Data Breach Impacts 238,000
  • CyberVolk Hackers Group With New VolkLocker Payloads Attacks both Linux and Windows Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark