Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New BlackForce Phishing Kit Lets Attackers Steal Credentials Using MitB Attacks and Bypass MFA

Posted on December 12, 2025December 12, 2025 By CWS

A classy phishing device referred to as BlackForce has emerged as a severe risk to organizations worldwide.

First noticed in August 2025, this professional-grade equipment permits criminals to steal login info and bypass multi-factor authentication utilizing superior Man-in-the-Browser strategies.

The device is actively being offered on Telegram boards for between 200 to 300 euros, making it accessible to a variety of risk actors.

BlackForce has already been used to focus on main manufacturers together with Disney, Netflix, DHL, and UPS, demonstrating its effectiveness in real-world assaults.

The phishing equipment represents a big evolution in credential theft capabilities. What makes BlackForce significantly harmful is its skill to carry out Man-in-the-Browser assaults, which permit attackers to intercept and manipulate communications between victims and legit web sites in actual time.

This system permits criminals to seize one-time authentication codes that victims obtain by way of SMS, e mail, or authenticator apps, successfully rendering multi-factor authentication ineffective.

At the very least 5 distinct variations of BlackForce have been documented, suggesting the attackers are repeatedly bettering their device.

Zscaler safety analysts recognized and analyzed the BlackForce phishing equipment after discovering suspicious patterns in phishing campaigns.

BlackForce phishing web page that hijacks an SMS code despatched to the sufferer (Supply – Zscaler)

The researchers discovered that the malicious domains used JavaScript information with cache-busting hashes to power browsers to obtain the most recent malicious code.

Notably, over 99 p.c of the malicious JavaScript consists of legit React and React Router code, giving the device a legit look that helps it evade preliminary detection.

Superior MitB Assault Mechanism

The core energy of BlackForce lies in its subtle multi-stage assault chain. When a sufferer clicks a phishing hyperlink, they encounter a legitimate-looking login web page that seems genuine to the bare eye.

Assault chain (Supply – Zscaler)

As soon as they enter their credentials, the attacker instantly receives a real-time alert by way of a command-and-control panel and positive factors entry to a Telegram channel with the stolen info.

The attacker’s view of the exfiltrated knowledge being despatched to Telegram (Supply – Zscaler)

The attacker then makes use of the credentials to log into the true service, triggering the MFA authentication immediate.

Right here, BlackForce demonstrates its technical prowess by deploying a pretend MFA web page immediately into the sufferer’s browser.

BlackForce management panel for model 3 (Supply – Zscaler)

The sufferer unknowingly enters their authentication code into this fraudulent web page, which is immediately captured by the attacker and used to finish the account takeover.

Newer variations of BlackForce use session storage to keep up state throughout web page reloads, making assaults extra resilient.

The device additionally implements sturdy anti-analysis filters that block safety researchers and automatic scanners utilizing Person-Agent parsing and ISP blocklists.

Organizations ought to implement zero-trust safety architectures to reduce the injury from such subtle assaults.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attackers, Attacks, BlackForce, Bypass, Credentials, Kit, Lets, MFA, MitB, Phishing, Steal

Post navigation

Previous Post: Policy, Isolation, and Data Controls That Actually Work
Next Post: Microsoft Bug Bounty Program Expanded to Third-Party Code

Related Posts

Qilin Ransomware Surging Following The Fall of dominant RansomHub RaaS Cyber Security News
Farmers Insurance Cyber Attack – 1.1 Million Customers Data Exposed in Salesforce Attack Cyber Security News
Android Photo Frames App Downloads Malware, Giving Hackers Control of The Device Without User Interaction Cyber Security News
Microsoft Exchange Server Vulnerabilities Let Attackers Spoof and Tamper Over Network Cyber Security News
Crypto User Loses $9,000 in Seconds After Clicking Instagram Ad Promising Easy Profits Cyber Security News
Threat Actors Weaponizing GitHub Accounts To Host Payloads, Tools and Amadey Malware Plug-Ins Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Recent GeoServer Vulnerability Exploited in Attacks
  • Microsoft Bug Bounty Program Expanded to Third-Party Code
  • New BlackForce Phishing Kit Lets Attackers Steal Credentials Using MitB Attacks and Bypass MFA
  • Policy, Isolation, and Data Controls That Actually Work
  • Beware of Fake Leonardo DiCaprio Movie Torrent File Drops Agent Tesla Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Recent GeoServer Vulnerability Exploited in Attacks
  • Microsoft Bug Bounty Program Expanded to Third-Party Code
  • New BlackForce Phishing Kit Lets Attackers Steal Credentials Using MitB Attacks and Bypass MFA
  • Policy, Isolation, and Data Controls That Actually Work
  • Beware of Fake Leonardo DiCaprio Movie Torrent File Drops Agent Tesla Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark