Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New AiTM Attack Campaign That Bypasses MFA Targeting Microsoft 365 and Okta Users

Posted on December 12, 2025December 12, 2025 By CWS

A classy phishing marketing campaign has emerged that efficiently bypasses multi-factor authentication, defending Microsoft 365 and Okta customers, representing a severe risk to organizations counting on these platforms for identification administration.

The marketing campaign, found in early December 2025, demonstrates superior data of authentication flows.

This marketing campaign targets firms throughout a number of industries via rigorously crafted phishing emails disguised as HR and advantages notifications.

Datadog Safety Labs safety analysts recognized this energetic phishing marketing campaign that particularly targets organizations utilizing Microsoft 365 and Okta for single sign-on providers.

The marketing campaign employs trendy phishing methods designed to intercept respectable SSO workflows, permitting attackers to seize each person credentials and session tokens earlier than MFA can block unauthorized entry.

The attackers have registered a number of lookalike domains, together with sso.okta-secure.io, sso.okta-cloud.com, and sso.okta-access.com, creating convincing replicas of genuine authentication pages.

Phishing marketing campaign (Supply – Datadog)

The phishing emails, despatched from compromised mailboxes linked to Salesforce Advertising and marketing Cloud, use compensation-focused lures equivalent to year-end wage evaluations and bonus info.

These messages embody shortened hyperlinks that redirect victims to first-stage phishing domains hosted on Cloudflare infrastructure.

Organizations have noticed a whole bunch of customers throughout a number of firms receiving these emails in current weeks, with the marketing campaign remaining energetic as of December 2025.

The assault succeeds via a two-stage phishing course of that leverages JavaScript-based credential harvesting. On the primary stage, attackers proxy respectable Okta pages whereas injecting malicious code that captures usernames and displays for session cookies.

Phishing web page (Supply – Datadog)

The injected inject.js script regularly displays particular crucial cookies together with idx, JSESSIONID, proximity_, DT, and sid, that are important for sustaining authenticated classes.

Each second, the script checks for brand new or modified cookies and exfiltrates them to the attacker’s server via a POST request to the /log_cookie endpoint, permitting the attacker to impersonate the sufferer’s session in their very own browser.

Understanding the JavaScript-Primarily based Credential Seize Mechanism

The technical sophistication lies in how the JavaScript interception operates in the course of the authentication course of.

The malicious code hooks the window.fetch technique, redirecting all respectable requests from Okta again to the attacker’s phishing area.

When a sufferer enters their username, the script captures it via DOM occasion listeners and shops it in a number of areas together with localStorage, sessionStorage, and cookies.

This ensures the credential is captured even when the person navigates between pages or clears browser storage.

Stream of the Microsoft 365 phishing pages (Supply – Datadog)

For victims utilizing Okta as their identification supplier with Microsoft 365, the assault turns into much more harmful.

When the sufferer begins Microsoft 365 authentication, a second injected script displays responses from Microsoft’s authentication endpoint for a subject known as FederationRedirectUrl.

The script detects when this URL factors to an Okta area and dynamically modifies it to redirect to the attacker’s second-stage Okta phishing web page as a substitute.

The attacker’s area then proxies all site visitors to the respectable Okta tenant, making a seamless expertise that tips customers into finishing authentication on the phishing web site.

Session cookies captured throughout this course of give attackers rapid entry to sufferer accounts with out requiring MFA circumvention—they merely replay the stolen session credentials.

Organizations ought to monitor their Okta logs for auth_via_mfa occasions with mismatched request origins from Cloudflare IP addresses and implement phishing-resistant MFA strategies like FIDO2 safety keys to stop such assaults.

Observe us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:AiTM, Attack, Bypasses, Campaign, MFA, Microsoft, Okta, Targeting, Users

Post navigation

Previous Post: Gladinet CentreStack Flaw Exploited to Hack Organizations
Next Post: New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale

Related Posts

Microsoft Defender for Office 365 New Dashboard to Provide More Details Across a Range of Threat Vectors Cyber Security News
CefSharp Enumeration Tool Reveals Security Vulnerabilities in .NET Desktop Apps Cyber Security News
Shai-Hulud 2.0 Malware Attack Compromised 30,000 Repositories and Stolen 500 GitHub Usernames and Tokens Cyber Security News
Hackers Using New Matrix Push C2 to Deliver Malware and Phishing Attacks via Web Browser Cyber Security News
Hackers Uses Social Engineering Attack to Gain Remote Access in 300 Seconds Cyber Security News
Iran-Nexus Hackers Abuses Omani Mailbox to Target Global Governments Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Password Reuse in Disguise: An Often-Missed Risky Workaround
  • WhatsApp Boosts Account Security for At-Risk Individuals
  • US Charges 31 More Defendants in Massive ATM Hacking Probe
  • WhatsApp Denies Lawsuit Claim and Confirms Messages are Device-encrypted and Private
  • Indurex Emerges From Stealth to Close Security Gap in Cyber-Physical Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Password Reuse in Disguise: An Often-Missed Risky Workaround
  • WhatsApp Boosts Account Security for At-Risk Individuals
  • US Charges 31 More Defendants in Massive ATM Hacking Probe
  • WhatsApp Denies Lawsuit Claim and Confirms Messages are Device-encrypted and Private
  • Indurex Emerges From Stealth to Close Security Gap in Cyber-Physical Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark