Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New PoisonSeed Attack Let Attackers Trick Users into Scanning a QR Code with an MFA Authenticator

Posted on July 21, 2025July 21, 2025 By CWS

A classy new assault method compromises Quick IDentity On-line (FIDO) key authentication by exploiting cross-device sign-in options. 

The PoisonSeed assault group has developed a technique to downgrade FIDO key protections via adversary-in-the-middle (AitM) phishing campaigns that trick customers into scanning malicious QR codes with their MFA authenticators. 

This growth represents a major escalation in identity-based assaults, which now account for 66.2% of safety incidents in line with current risk intelligence experiences.

Key Takeaways1. PoisonSeed tips customers into scanning malicious QR codes to bypass FIDO key safety.2. Exploits cross-device sign-in by intercepting authentication between customers and login portals.3. Allow Bluetooth necessities and monitor authentication logs for suspicious exercise.

How the PoisonSeed Assault Works

Expel experiences that the assault begins with a standard phishing e-mail directing targets to fraudulent login pages that mimic authentic authentication portals, resembling pretend Okta interfaces hosted on suspicious domains like okta[.]login-request[.]com. 

When customers with FIDO key safety enter their credentials on these phishing websites, attackers robotically relay the stolen username and password to the authentic login portal whereas concurrently requesting cross-device sign-in performance.

The malicious actors exploit the cross-device sign-in function by capturing the QR code generated by the authentic authentication system and displaying it to victims on the pretend phishing web page. 

This system successfully bypasses the bodily interplay requirement usually related to FIDO keys, as customers unknowingly full the authentication course of by scanning the QR code with their cellular MFA authenticator purposes.

Cross-device sign-in performance was designed to assist customers authenticate on methods with out registered passkeys by using further enrolled units, usually cellphones with MFA authenticator purposes. 

Underneath regular circumstances, this course of includes safe communication between the login portal and the MFA authenticator to confirm consumer id. 

Nonetheless, PoisonSeed attackers have weaponized this authentic safety function by positioning themselves as intermediaries within the authentication movement.

The assault leverages respected infrastructure companies like Cloudflare to host phishing domains resembling aws-us3-manageprod[.]com, lending false credibility to the malicious websites. 

This infrastructure alternative helps the fraudulent login pages seem extra reliable to potential victims, growing the chance of profitable credential harvesting.

Mitigations

Regardless of these assaults, FIDO keys stay priceless safety investments, although organizations should now audit authentication logs extra fastidiously for suspicious exercise. 

Safety groups ought to monitor for cross-device sign-in requests from uncommon geographic areas, surprising FIDO key registrations, and a number of keys registered in fast succession.

A vital defensive measure includes enabling Bluetooth communication necessities between cellular units and unregistered methods throughout cross-device sign-in processes, which would scale back AitM assault effectiveness to just about zero. 

Organizations also needs to overview authentication units related to compromised accounts, terminate affected consumer classes, and reset passwords when incidents are detected.

Increase detection, scale back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Strive ANY.RUN Now 

Cyber Security News Tags:Attack, Attackers, Authenticator, Code, MFA, PoisonSeed, Scanning, Trick, Users

Post navigation

Previous Post: PoisonSeed Hackers Bypass FIDO Keys Using QR Phishing and Cross-Device Sign-In Abuse
Next Post: Microsoft Released an Emergency Security Update to Patch a Critical SharePoint 0-Day Vulnerability

Related Posts

Sitecore CMS Platform Vulnerabilities Enables Remote Code Execution Cyber Security News
Oyster Malware as PuTTY, KeyPass Attacking IT Admins by Poisoning SEO Results Cyber Security News
Mitigating Malware Threats on Unmanaged Endpoint Devices Cyber Security News
Microsoft Edge for Android Adds InPrivate Tab Locking with PIN & Bio Authentication Cyber Security News
Apache Tomcat Vulnerabilities Let Attackers Trigger Dos Attack Cyber Security News
Chrome Extensions Vulnerability Exposes API Keys, Secrets, and Tokens Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Ex-WhatsApp Security Chief Sues Meta Over Vulnerabilities, Retaliation
  • RatOn Android Malware Detected With NFC Relay and ATS Banking Fraud Capabilities
  • 160,000 Impacted by Wayne Memorial Hospital Data Breach
  • Chinese Salt Typhoon and UNC4841 Hackers Teamed Up to Attack Government and Corporate Infrastructure
  • [Webinar] Shadow AI Agents Multiply Fast — Learn How to Detect and Control Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Ex-WhatsApp Security Chief Sues Meta Over Vulnerabilities, Retaliation
  • RatOn Android Malware Detected With NFC Relay and ATS Banking Fraud Capabilities
  • 160,000 Impacted by Wayne Memorial Hospital Data Breach
  • Chinese Salt Typhoon and UNC4841 Hackers Teamed Up to Attack Government and Corporate Infrastructure
  • [Webinar] Shadow AI Agents Multiply Fast — Learn How to Detect and Control Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News