Email Services Warnings: Avoid This Two-Factor Authentication Sign-In Method for Gmail and Outlook
In the digital world, billions of individuals rely on email platforms like Gmail, Outlook, AOL, and Yahoo every day. Despite believing 2-factor authentication (2FA) keeps you secure, a chilling new threat exists. This attack "bypasses 2FA through session hijacking and real-time credential interception." Unbeknownst to you, the danger lurks within the malicious sign-in page shown below.
The caution comes from SlashNext, who recently unveiled a new phishing kit dubbed Astaroth. On an infected device, Astaroth deploys a man-in-the-middle attack, capturing login credentials, tokens, and session cookies in real-time, effectively bypassing 2FA.
First advertised last month, Astaroth distinguishes itself by utterly intercepting login credentials and 2FA authentication tokens and session cookies as quickly as they're generated. The real-time interception, powered by a reverse proxy mechanism, allows attackers to bypass 2FA defenses "with striking speed and accuracy."
SlashNext warns that contrasting conventional phishing kits relying on static fake login pages, Astaroth dynamically intercepts all authentication data in real-time, significantly enhancing the attacker's effectiveness.
The perilous process commences with a simple link and a click, which directs you to a malicious server mimicking the target domain's appearance and functionality while relaying traffic between the victim and the legitimate signing page. Presented with Google as an option, you'll encounter the sign-in page without any security alerts. The man-in-the-middle attack (MitM) intercepts your data, while the authentic webpage operates in the shadows.

In the realm of security, the sense of assurance provided by 2FA crumbles in the face of this attack. Since 2FA is an integral part of Astaroth, it automatically captures 2FA tokens as the user enters them, and alerts the attacker in real-time.
2FA confronts its challenges, prompting the emergence of passkeys. Yet, this attack unearths another peril: session cookie theft. While mitigation strategies are available to address session cookie theft, it remains a significant hurdle.
Astaroth is now commercially accessible for $2,000, granting users six months of continuous updates and access to cutting-edge bypass techniques. Before purchase, Astaroth even provides a testing ground to amplify its credibility on cybercrime marketplaces.
As phishing lures adapt with the aid of AI, the counsel remains the same: never click links, avoid pop-up sign-ins, and stick to trusted login methods. Instead of trusting non-requested links, navigate to the signing page through official channels.

Enrichment Data (infused sparingly into the text)
Astaroth's power lies in its complex techniques, which include:
- Man-in-the-Middle (MitM) Reverse Proxy: By leveraging an evilginx-style reverse proxy, Astaroth intercepts traffic between the user and the legitimate authentication server. This setup ensures real-time data capture of login credentials, 2FA tokens, and session cookies without raising any alarms for the user.
- Dynamic Credential Capture: In contrast to traditional phishing kits, Astaroth dynamically intercepts all types of authentication data. This ends with capturing usernames, passwords, 2FA tokens (like SMS codes or app-generated codes), and session cookies in real-time.
- SSL-Certified Phishing Domains: Astaroth often operates using phishing domains with SSL certificates. This lends legitimacy to the domains, preventing users from noticing any security warnings.
- Session Cookie Interception: Astaroth captures session cookies issued to the user after successful authentication. By replicating this session on an attacker's device using tools like Burp Suite or manual header modifications, the attackers can effortlessly dodge further authentication requirements and 2FA verification, providing them full access to the user's account.
- Real-Time Alerts and Immediate Action: Astaroth offers real-time alerts through a web panel or Telegram notifications, allowing attackers to act swiftly after capturing the data. This rapid response helps attackers to exploit the intercepted data before security measures have time to react.
- Bulletproof Hosting: Astaroth provides bulletproof hosting services that withstand takedown attempts by law enforcement by operating in jurisdictions with minimal regulatory oversight. This makes it challenging for authorities to shut down the phishing operations.
- Microsoft issued a warning about the new Astaroth phishing kit, emphasizing the danger it poses to Gmail and Outlook users.
- Creating a new Gmail account could be risky, given the threat of the Astaroth attack intercepting login credentials and 2-factor authentication tokens.
- The FBI advised users to be vigilant of Gmail warnings, as Astaroth could potentially launch an AI attack to compromise their accounts.
- Outlook users were warned about the Astaroth attack, with warnings popping up on their screens to ensure they're navigating to the correct login page to avoid interception.
- Google issued a warning about the Gemini attack, which shares similarities with Astaroth, targeting users by intercepting their session cookies and bypassing 2FA.
- Users received multiple Gmail warnings about possible AI attacks, urging them to enable 2-factor authentication and avoid clicking on unverified links.
- Android users were warned about potential Android warning messages, as attackers might use the Astaroth kit to launch man-in-the-middle attacks and intercept their login credentials.