Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Using Dedicated Phishlet to Launch FIDO Authentication Downgrade Attacks

Posted on August 14, 2025August 14, 2025 By CWS

A classy new menace vector has emerged that might undermine some of the trusted authentication strategies in cybersecurity.

FIDO-based passkeys, lengthy thought-about the gold normal for phishing-resistant authentication, at the moment are dealing with a probably devastating assault method that forces customers to downgrade to much less safe authentication strategies.

The assault exploits a essential vulnerability in FIDO implementation throughout main platforms, notably Microsoft Entra ID, the place sure net browsers lack full passkey help.

This seemingly minor compatibility hole creates a possibility for cybercriminals to govern the authentication course of, forcing victims into utilizing conventional multi-factor authentication strategies which can be inclined to adversary-in-the-middle assaults.

Error proven when utilizing an ordinary phishlet for a person with FIDO authentication (Supply – Proofpoint)

Trendy phishing campaigns have advanced considerably with the rise of refined AiTM phishing kits like Evilginx, EvilProxy, and Tycoon, which have made session hijacking extra accessible to menace actors.

Record of sufferer’s periods in Evilginx (Supply – Proofpoint)

These platforms present intuitive interfaces that decrease technical obstacles, enabling attackers to execute complicated phishing operations with unprecedented ease.

Proofpoint researchers recognized this rising menace after discovering that normal phishlets usually fail when encountering FIDO-secured accounts, prompting attackers to develop specialised strategies.

The assault begins when victims obtain phishing messages containing malicious hyperlinks powered by a devoted FIDO downgrade phishlet.

Upon clicking, targets encounter what seems to be an authentication error, compelling them to pick out various sign-in strategies.

This misleading interface mirrors authentic Microsoft authentication pages, making a convincing phantasm of system malfunction.

Technical Implementation and Consumer Agent Spoofing

The core mechanism behind FIDO authentication downgrade assaults depends on refined person agent spoofing strategies.

Attackers configure their AiTM infrastructure to current itself as an unsupported browser surroundings, reminiscent of Safari on Home windows, which lacks FIDO2 compatibility with Microsoft Entra ID.

The attacker efficiently authenticates because the sufferer, utilizing the intercepted session cookie (Supply – Proofpoint)

When the authentication system detects this spoofed surroundings, it mechanically presents fallback choices.

The assault sequence demonstrates outstanding technical sophistication. As soon as victims authenticate via the downgraded technique, attackers intercept credentials and session tokens utilizing reverse proxy servers.

The stolen session cookies can then be imported straight into the attacker’s browser, enabling full account takeover with out requiring extra authentication challenges.

This method successfully bypasses even probably the most sturdy FIDO implementations by exploiting the human component slightly than technical vulnerabilities within the cryptographic protocols themselves.

Enhance your SOC and assist your workforce shield your corporation with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Attacks, Authentication, Dedicated, Downgrade, FIDO, Hackers, Launch, Phishlet

Post navigation

Previous Post: Have You Turned Off Your Virtual Oven?
Next Post: CISA Warns of Attacks Exploiting N-able Vulnerabilities

Related Posts

IRGC Hacker Groups Attacking Targeted Financial, Government, and Media Organizations Cyber Security News
AI-Powered Code Editor Cursor IDE Vulnerability Enables Remote Code Without User Interaction Cyber Security News
Microsoft Teams to Allow Users Adding Agents and Bots With Their Current Conversation Cyber Security News
Lumma Stealer Via Fake Cracked Software Steals Login Credentials and Private Files Cyber Security News
7-Zip Arbitrary File Write Vulnerability Let Attackers Execute Arbitrary Code Cyber Security News
Microsoft Bookings Vulnerability Let Attackers Alter the Meeting Details Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Canada’s House of Commons Hit by Cyberattack Exploiting Recent Microsoft vulnerability
  • Vulnerabilities in Xerox Print Orchestration Product Allow Remote Code Execution
  • Apache Tomcat Vulnerabilities Let Attackers Trigger Dos Attack
  • Hackers Found Using CrossC2 to Expand Cobalt Strike Beacon’s Reach to Linux and macOS
  • CISA Warns of Attacks Exploiting N-able Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Canada’s House of Commons Hit by Cyberattack Exploiting Recent Microsoft vulnerability
  • Vulnerabilities in Xerox Print Orchestration Product Allow Remote Code Execution
  • Apache Tomcat Vulnerabilities Let Attackers Trigger Dos Attack
  • Hackers Found Using CrossC2 to Expand Cobalt Strike Beacon’s Reach to Linux and macOS
  • CISA Warns of Attacks Exploiting N-able Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News