Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New PoisonSeed Attack Let Attackers Trick Users into Scanning a QR Code with an MFA Authenticator

Posted on July 21, 2025July 21, 2025 By CWS

A classy new assault method compromises Quick IDentity On-line (FIDO) key authentication by exploiting cross-device sign-in options. 

The PoisonSeed assault group has developed a technique to downgrade FIDO key protections via adversary-in-the-middle (AitM) phishing campaigns that trick customers into scanning malicious QR codes with their MFA authenticators. 

This growth represents a major escalation in identity-based assaults, which now account for 66.2% of safety incidents in line with current risk intelligence experiences.

Key Takeaways1. PoisonSeed tips customers into scanning malicious QR codes to bypass FIDO key safety.2. Exploits cross-device sign-in by intercepting authentication between customers and login portals.3. Allow Bluetooth necessities and monitor authentication logs for suspicious exercise.

How the PoisonSeed Assault Works

Expel experiences that the assault begins with a standard phishing e-mail directing targets to fraudulent login pages that mimic authentic authentication portals, resembling pretend Okta interfaces hosted on suspicious domains like okta[.]login-request[.]com. 

When customers with FIDO key safety enter their credentials on these phishing websites, attackers robotically relay the stolen username and password to the authentic login portal whereas concurrently requesting cross-device sign-in performance.

The malicious actors exploit the cross-device sign-in function by capturing the QR code generated by the authentic authentication system and displaying it to victims on the pretend phishing web page. 

This system successfully bypasses the bodily interplay requirement usually related to FIDO keys, as customers unknowingly full the authentication course of by scanning the QR code with their cellular MFA authenticator purposes.

Cross-device sign-in performance was designed to assist customers authenticate on methods with out registered passkeys by using further enrolled units, usually cellphones with MFA authenticator purposes. 

Underneath regular circumstances, this course of includes safe communication between the login portal and the MFA authenticator to confirm consumer id. 

Nonetheless, PoisonSeed attackers have weaponized this authentic safety function by positioning themselves as intermediaries within the authentication movement.

The assault leverages respected infrastructure companies like Cloudflare to host phishing domains resembling aws-us3-manageprod[.]com, lending false credibility to the malicious websites. 

This infrastructure alternative helps the fraudulent login pages seem extra reliable to potential victims, growing the chance of profitable credential harvesting.

Mitigations

Regardless of these assaults, FIDO keys stay priceless safety investments, although organizations should now audit authentication logs extra fastidiously for suspicious exercise. 

Safety groups ought to monitor for cross-device sign-in requests from uncommon geographic areas, surprising FIDO key registrations, and a number of keys registered in fast succession.

A vital defensive measure includes enabling Bluetooth communication necessities between cellular units and unregistered methods throughout cross-device sign-in processes, which would scale back AitM assault effectiveness to just about zero. 

Organizations also needs to overview authentication units related to compromised accounts, terminate affected consumer classes, and reset passwords when incidents are detected.

Increase detection, scale back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Strive ANY.RUN Now 

Cyber Security News Tags:Attack, Attackers, Authenticator, Code, MFA, PoisonSeed, Scanning, Trick, Users

Post navigation

Previous Post: PoisonSeed Hackers Bypass FIDO Keys Using QR Phishing and Cross-Device Sign-In Abuse
Next Post: Microsoft Released an Emergency Security Update to Patch a Critical SharePoint 0-Day Vulnerability

Related Posts

DeerStealer Malware Delivered Via Weaponized .LNK Using LOLBin Tools Cyber Security News
Microsoft Outlook’s New Two-Click View for Encrypted Emails Protects From Accidental Exposure Cyber Security News
AI Crawlers Reshape The Internet With Over 30% of Global Web Traffic Cyber Security News
Clorox Sues IT Provider Cognizant For Simply Giving Employee Password to Hackers Cyber Security News
Hackers Stolen $500,000 in Crypto Assets by Weaponizing AI Extension Cyber Security News
New Report Uncover That Chinese Hackers Attempted To Compromise SentinelOne’s Own Servers Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Threat Actor Mimo Targets Magento and Docker to Deploy Crypto Miners and Proxyware
  • How Businesses Prevent Credential Theft with Early Phishing Detection
  • Silicon Valley Engineer Pleads Guilty to Stealing Missile Detection Data for China
  • Coyote Malware Abuses Microsoft’s UI Automation in Wild to Exfiltrate Login Credentials
  • Windows 11 Gets New AI-Powered Features

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Threat Actor Mimo Targets Magento and Docker to Deploy Crypto Miners and Proxyware
  • How Businesses Prevent Credential Theft with Early Phishing Detection
  • Silicon Valley Engineer Pleads Guilty to Stealing Missile Detection Data for China
  • Coyote Malware Abuses Microsoft’s UI Automation in Wild to Exfiltrate Login Credentials
  • Windows 11 Gets New AI-Powered Features

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News