Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New BlackForce Phishing Kit Lets Attackers Steal Credentials Using MitB Attacks and Bypass MFA

Posted on December 12, 2025December 12, 2025 By CWS

A classy phishing device referred to as BlackForce has emerged as a severe risk to organizations worldwide.

First noticed in August 2025, this professional-grade equipment permits criminals to steal login info and bypass multi-factor authentication utilizing superior Man-in-the-Browser strategies.

The device is actively being offered on Telegram boards for between 200 to 300 euros, making it accessible to a variety of risk actors.

BlackForce has already been used to focus on main manufacturers together with Disney, Netflix, DHL, and UPS, demonstrating its effectiveness in real-world assaults.

The phishing equipment represents a big evolution in credential theft capabilities. What makes BlackForce significantly harmful is its skill to carry out Man-in-the-Browser assaults, which permit attackers to intercept and manipulate communications between victims and legit web sites in actual time.

This system permits criminals to seize one-time authentication codes that victims obtain by way of SMS, e mail, or authenticator apps, successfully rendering multi-factor authentication ineffective.

At the very least 5 distinct variations of BlackForce have been documented, suggesting the attackers are repeatedly bettering their device.

Zscaler safety analysts recognized and analyzed the BlackForce phishing equipment after discovering suspicious patterns in phishing campaigns.

BlackForce phishing web page that hijacks an SMS code despatched to the sufferer (Supply – Zscaler)

The researchers discovered that the malicious domains used JavaScript information with cache-busting hashes to power browsers to obtain the most recent malicious code.

Notably, over 99 p.c of the malicious JavaScript consists of legit React and React Router code, giving the device a legit look that helps it evade preliminary detection.

Superior MitB Assault Mechanism

The core energy of BlackForce lies in its subtle multi-stage assault chain. When a sufferer clicks a phishing hyperlink, they encounter a legitimate-looking login web page that seems genuine to the bare eye.

Assault chain (Supply – Zscaler)

As soon as they enter their credentials, the attacker instantly receives a real-time alert by way of a command-and-control panel and positive factors entry to a Telegram channel with the stolen info.

The attacker’s view of the exfiltrated knowledge being despatched to Telegram (Supply – Zscaler)

The attacker then makes use of the credentials to log into the true service, triggering the MFA authentication immediate.

Right here, BlackForce demonstrates its technical prowess by deploying a pretend MFA web page immediately into the sufferer’s browser.

BlackForce management panel for model 3 (Supply – Zscaler)

The sufferer unknowingly enters their authentication code into this fraudulent web page, which is immediately captured by the attacker and used to finish the account takeover.

Newer variations of BlackForce use session storage to keep up state throughout web page reloads, making assaults extra resilient.

The device additionally implements sturdy anti-analysis filters that block safety researchers and automatic scanners utilizing Person-Agent parsing and ISP blocklists.

Organizations ought to implement zero-trust safety architectures to reduce the injury from such subtle assaults.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attackers, Attacks, BlackForce, Bypass, Credentials, Kit, Lets, MFA, MitB, Phishing, Steal

Post navigation

Previous Post: Policy, Isolation, and Data Controls That Actually Work
Next Post: Notepad++ Patches Updater Flaw After Reports of Traffic Hijacking

Related Posts

Kenyan Filmmakers Installed With FlexiSPY Spyware That Monitors Messages and Social Media Cyber Security News
Chrome Security Update – Patch for 21 Vulnerabilities that Allows Attackers to Crash Browser Cyber Security News
What is MCP Server – How it is Powering AI-Driven Cyber Defense Cyber Security News
New Sophisticated Attack Bypasses Content Security Policy Using HTML-Injection Technique Cyber Security News
Hackers Using Leverage Tuoni C2 Framework Tool to Stealthily Deliver In-Memory Payloads Cyber Security News
Apache Syncope Groovy RCE Vulnerability Let Attackers Inject Malicious Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top 10 Best VPN Services of 2026
  • Hundreds of Exposed Clawdbot Gateways Leave API Keys and Private Chats Vulnerable
  • Indian Users Targeted in Tax Phishing Campaign Delivering Blackmoon Malware
  • Access System Flaws Enabled Hackers to Unlock Doors at Major European Firms
  • Malicious VS Code AI Extensions with 1.5 Million Installs Steal Developer Source Code

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top 10 Best VPN Services of 2026
  • Hundreds of Exposed Clawdbot Gateways Leave API Keys and Private Chats Vulnerable
  • Indian Users Targeted in Tax Phishing Campaign Delivering Blackmoon Malware
  • Access System Flaws Enabled Hackers to Unlock Doors at Major European Firms
  • Malicious VS Code AI Extensions with 1.5 Million Installs Steal Developer Source Code

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark