Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New AiTM Attack Campaign That Bypasses MFA Targeting Microsoft 365 and Okta Users

Posted on December 12, 2025December 12, 2025 By CWS

A classy phishing marketing campaign has emerged that efficiently bypasses multi-factor authentication, defending Microsoft 365 and Okta customers, representing a severe risk to organizations counting on these platforms for identification administration.

The marketing campaign, found in early December 2025, demonstrates superior data of authentication flows.

This marketing campaign targets firms throughout a number of industries via rigorously crafted phishing emails disguised as HR and advantages notifications.

Datadog Safety Labs safety analysts recognized this energetic phishing marketing campaign that particularly targets organizations utilizing Microsoft 365 and Okta for single sign-on providers.

The marketing campaign employs trendy phishing methods designed to intercept respectable SSO workflows, permitting attackers to seize each person credentials and session tokens earlier than MFA can block unauthorized entry.

The attackers have registered a number of lookalike domains, together with sso.okta-secure.io, sso.okta-cloud.com, and sso.okta-access.com, creating convincing replicas of genuine authentication pages.

Phishing marketing campaign (Supply – Datadog)

The phishing emails, despatched from compromised mailboxes linked to Salesforce Advertising and marketing Cloud, use compensation-focused lures equivalent to year-end wage evaluations and bonus info.

These messages embody shortened hyperlinks that redirect victims to first-stage phishing domains hosted on Cloudflare infrastructure.

Organizations have noticed a whole bunch of customers throughout a number of firms receiving these emails in current weeks, with the marketing campaign remaining energetic as of December 2025.

The assault succeeds via a two-stage phishing course of that leverages JavaScript-based credential harvesting. On the primary stage, attackers proxy respectable Okta pages whereas injecting malicious code that captures usernames and displays for session cookies.

Phishing web page (Supply – Datadog)

The injected inject.js script regularly displays particular crucial cookies together with idx, JSESSIONID, proximity_, DT, and sid, that are important for sustaining authenticated classes.

Each second, the script checks for brand new or modified cookies and exfiltrates them to the attacker’s server via a POST request to the /log_cookie endpoint, permitting the attacker to impersonate the sufferer’s session in their very own browser.

Understanding the JavaScript-Primarily based Credential Seize Mechanism

The technical sophistication lies in how the JavaScript interception operates in the course of the authentication course of.

The malicious code hooks the window.fetch technique, redirecting all respectable requests from Okta again to the attacker’s phishing area.

When a sufferer enters their username, the script captures it via DOM occasion listeners and shops it in a number of areas together with localStorage, sessionStorage, and cookies.

This ensures the credential is captured even when the person navigates between pages or clears browser storage.

Stream of the Microsoft 365 phishing pages (Supply – Datadog)

For victims utilizing Okta as their identification supplier with Microsoft 365, the assault turns into much more harmful.

When the sufferer begins Microsoft 365 authentication, a second injected script displays responses from Microsoft’s authentication endpoint for a subject known as FederationRedirectUrl.

The script detects when this URL factors to an Okta area and dynamically modifies it to redirect to the attacker’s second-stage Okta phishing web page as a substitute.

The attacker’s area then proxies all site visitors to the respectable Okta tenant, making a seamless expertise that tips customers into finishing authentication on the phishing web site.

Session cookies captured throughout this course of give attackers rapid entry to sufferer accounts with out requiring MFA circumvention—they merely replay the stolen session credentials.

Organizations ought to monitor their Okta logs for auth_via_mfa occasions with mismatched request origins from Cloudflare IP addresses and implement phishing-resistant MFA strategies like FIDO2 safety keys to stop such assaults.

Observe us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:AiTM, Attack, Bypasses, Campaign, MFA, Microsoft, Okta, Targeting, Users

Post navigation

Previous Post: Gladinet CentreStack Flaw Exploited to Hack Organizations
Next Post: New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale

Related Posts

Automatic BitLocker Encryption May Silently Lock Away Your Data Cyber Security News
Azure API Vulnerabilities Leak VPN Keys and Built-In Roles Allow Over-Privileged Access Cyber Security News
New Banking Malware Abusing WhatsApp to Gain Complete Remote Access to Your Computer Cyber Security News
Infostealers Actively Attacking macOS Users in The Wild to Steal Sensitive Data Cyber Security News
Washington Post Oracle E-Suite Hack Impacts 9K+ Employees and Contractors Cyber Security News
Multiple Apache Tomcat Vulnerabilities Let Attackers Trigger DoS Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Surge in Attacks Targeting RSC-Enabled Services Worldwide
  • In Other News: PromptPwnd Attack, Small macOS Bounties, Chinese Hackers Trained in Cisco Academy
  • New JSCEAL Infostealer Malware Attacking Windows Systems to Steal Login Credentials
  • New Research Details on What Happens to Data Stolen in a Phishing Attack
  • New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Surge in Attacks Targeting RSC-Enabled Services Worldwide
  • In Other News: PromptPwnd Attack, Small macOS Bounties, Chinese Hackers Trained in Cisco Academy
  • New JSCEAL Infostealer Malware Attacking Windows Systems to Steal Login Credentials
  • New Research Details on What Happens to Data Stolen in a Phishing Attack
  • New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark