Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New PoisonSeed Attack Let Attackers Trick Users into Scanning a QR Code with an MFA Authenticator

Posted on July 21, 2025July 21, 2025 By CWS

A classy new assault method compromises Quick IDentity On-line (FIDO) key authentication by exploiting cross-device sign-in options. 

The PoisonSeed assault group has developed a technique to downgrade FIDO key protections via adversary-in-the-middle (AitM) phishing campaigns that trick customers into scanning malicious QR codes with their MFA authenticators. 

This growth represents a major escalation in identity-based assaults, which now account for 66.2% of safety incidents in line with current risk intelligence experiences.

Key Takeaways1. PoisonSeed tips customers into scanning malicious QR codes to bypass FIDO key safety.2. Exploits cross-device sign-in by intercepting authentication between customers and login portals.3. Allow Bluetooth necessities and monitor authentication logs for suspicious exercise.

How the PoisonSeed Assault Works

Expel experiences that the assault begins with a standard phishing e-mail directing targets to fraudulent login pages that mimic authentic authentication portals, resembling pretend Okta interfaces hosted on suspicious domains like okta[.]login-request[.]com. 

When customers with FIDO key safety enter their credentials on these phishing websites, attackers robotically relay the stolen username and password to the authentic login portal whereas concurrently requesting cross-device sign-in performance.

The malicious actors exploit the cross-device sign-in function by capturing the QR code generated by the authentic authentication system and displaying it to victims on the pretend phishing web page. 

This system successfully bypasses the bodily interplay requirement usually related to FIDO keys, as customers unknowingly full the authentication course of by scanning the QR code with their cellular MFA authenticator purposes.

Cross-device sign-in performance was designed to assist customers authenticate on methods with out registered passkeys by using further enrolled units, usually cellphones with MFA authenticator purposes. 

Underneath regular circumstances, this course of includes safe communication between the login portal and the MFA authenticator to confirm consumer id. 

Nonetheless, PoisonSeed attackers have weaponized this authentic safety function by positioning themselves as intermediaries within the authentication movement.

The assault leverages respected infrastructure companies like Cloudflare to host phishing domains resembling aws-us3-manageprod[.]com, lending false credibility to the malicious websites. 

This infrastructure alternative helps the fraudulent login pages seem extra reliable to potential victims, growing the chance of profitable credential harvesting.

Mitigations

Regardless of these assaults, FIDO keys stay priceless safety investments, although organizations should now audit authentication logs extra fastidiously for suspicious exercise. 

Safety groups ought to monitor for cross-device sign-in requests from uncommon geographic areas, surprising FIDO key registrations, and a number of keys registered in fast succession.

A vital defensive measure includes enabling Bluetooth communication necessities between cellular units and unregistered methods throughout cross-device sign-in processes, which would scale back AitM assault effectiveness to just about zero. 

Organizations also needs to overview authentication units related to compromised accounts, terminate affected consumer classes, and reset passwords when incidents are detected.

Increase detection, scale back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Strive ANY.RUN Now 

Cyber Security News Tags:Attack, Attackers, Authenticator, Code, MFA, PoisonSeed, Scanning, Trick, Users

Post navigation

Previous Post: PoisonSeed Hackers Bypass FIDO Keys Using QR Phishing and Cross-Device Sign-In Abuse
Next Post: Microsoft Released an Emergency Security Update to Patch a Critical SharePoint 0-Day Vulnerability

Related Posts

Healthcare Sector Emerges as a Prime Target for Cyber Attacks in 2025 Cyber Security News
OPPO Clone Phone Weak WiFi Hotspot Exposes Sensitive Data Cyber Security News
New Malware Spotted in The Wild Using Prompt Injection to Manipulate AI Models Processing Sample Cyber Security News
The Rise of Subscription-Based Cybercrime Cyber Security News
Golden SAML Attack Let Attackers Gains Control of The Private Keyused by Federation Server Cyber Security News
macOS Gatekeeper Explained: Strengthening System Defenses Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Remove Your Data From Data Broker Sites
  • TP-Link Network Video Recorder Vulnerability Let Attackers Execute Arbitrary Commands
  • SharePoint 0-day Vulnerability Exploited in Wild by All Sorts of Hacker Groups
  • Critical Mitel Flaw Lets Hackers Bypass Login, Gain Full Access to MiVoice MX-ONE Systems
  • Fire Ant Exploits VMware Flaws to Compromise ESXi Hosts and vCenter Environments

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Remove Your Data From Data Broker Sites
  • TP-Link Network Video Recorder Vulnerability Let Attackers Execute Arbitrary Commands
  • SharePoint 0-day Vulnerability Exploited in Wild by All Sorts of Hacker Groups
  • Critical Mitel Flaw Lets Hackers Bypass Login, Gain Full Access to MiVoice MX-ONE Systems
  • Fire Ant Exploits VMware Flaws to Compromise ESXi Hosts and vCenter Environments

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News