Ad Banner
Advertisement by Open Privilege

Two-factor authentication has been cracked by hackers

Image Credits: UnsplashImage Credits: Unsplash
  • Hackers have developed a phishing tool, Astaroth, that bypasses two-factor authentication by capturing both login credentials and 2FA codes in real time.
  • The tool is sold on the Dark Web for around $2,000, making it accessible to cybercriminals seeking to compromise accounts on platforms like Google and Microsoft.
  • Experts recommend using more secure authentication methods, such as biometrics or passkeys, to protect against evolving phishing threats and enhance online security.

[WORLD] Two-factor authentication (2FA) has long been hailed as one of the most effective ways to secure online accounts from unauthorized access. By requiring users to input something they know (a password) and something they have (usually a code sent via SMS or email), 2FA provides an additional layer of security that makes it significantly harder for hackers to break into accounts. However, recent developments have shown that hackers have found ways to bypass these protections, making the future of online security increasingly uncertain.

A new phishing tool, named Astaroth, has emerged as a serious threat to two-factor authentication systems. According to a report by cybersecurity experts at SlashNext, Astaroth is capable of bypassing 2FA mechanisms on popular platforms like Google, Microsoft, and Yahoo. The tool is sold on the Dark Web for around $2,000 (RM8,855), making it accessible to cybercriminals with the necessary resources. This phishing kit exploits users' trust and can steal both login credentials and the critical authentication codes that should protect them.

"Hackers have developed a phishing kit capable of bypassing two-factor authentication systems, previously considered to be one of the most secure ways of protecting access to online accounts." The tool works by sending fraudulent links to users, which direct them to a fake login page that closely resembles the legitimate one for services like Google or Microsoft. When the user enters their login credentials, along with the 2FA code, the hackers capture both pieces of information in real time, allowing them to gain unauthorized access to the victim's account.

This new attack method highlights a critical vulnerability in two-factor authentication: the reliance on SMS or email-based codes. While these methods were once considered secure, they can now be intercepted by sophisticated phishing attacks. In fact, Astaroth's ability to bypass these codes in real time makes it particularly dangerous.

How Astaroth Works

Astaroth operates by exploiting the trust that users place in legitimate-looking login pages. When a victim clicks on a phishing link sent by the hacker, they are taken to a fake page designed to mirror the official login interface of a popular platform. The user enters their password and, if 2FA is enabled, their authentication code. Instead of being securely processed by the legitimate service, the hacker collects this sensitive information, which is then used to access the account.

One of the most concerning aspects of this attack is Astaroth's ability to intercept the 2FA codes as they are entered. While traditional phishing schemes typically only target passwords, Astaroth goes a step further by capturing both the username and the second factor of authentication, effectively rendering two-factor authentication useless in this case.

"What makes Astaroth particularly dangerous is its ability to intercept two-factor authentication codes in real time," said SlashNext in their report. This method of attack has raised alarm bells among cybersecurity experts, as it shows how even the most robust security measures can be compromised by clever phishing techniques.

The Dark Web Marketplace: A Growing Threat

Astaroth is not an isolated case. The fact that the tool is being sold on the Dark Web for a relatively low price suggests that it may soon become more widespread. Cybercriminals can easily purchase phishing kits and use them to target individual users or large organizations. This poses a significant challenge for businesses that rely on 2FA to secure their employees' accounts, as phishing attacks can bypass this security layer with minimal effort.

The existence of such tools on the Dark Web underscores the increasing sophistication of cybercriminals. These malicious actors are no longer relying solely on brute force attacks or traditional malware. Instead, they are investing in more advanced methods, like phishing kits, that allow them to circumvent even the most advanced security protocols.

"The complete kit is sold on the Dark Web for US$2,000 (RM8,855)," making it accessible to a wide range of cybercriminals. While $2,000 might seem like a steep price for a piece of malicious software, it is a small investment when compared to the potential profits from hacking into high-profile accounts or stealing sensitive data.

How to Protect Yourself from Phishing Attacks

The emergence of Astaroth and other phishing tools is a stark reminder that no security measure is entirely foolproof. However, there are steps that users can take to protect themselves against phishing attacks and ensure that their accounts remain secure.

Be Cautious with Links: One of the simplest ways to avoid falling victim to phishing attacks is to be wary of clicking on links from unknown or suspicious sources. If you receive an unsolicited email with a link asking you to log in, it's better to visit the official website directly rather than trusting the link provided.

Enable Multi-Factor Authentication: While 2FA can be bypassed by phishing tools like Astaroth, multi-factor authentication (MFA) methods that rely on more secure methods, such as biometrics (fingerprint or facial recognition), offer an extra layer of protection. Services like Apple, Google, and Microsoft now support passwordless login options, which can help reduce the risk of phishing.

Use Anti-Phishing Tools: Many modern browsers and email services have built-in anti-phishing protections that can detect fraudulent websites and warn users before they enter their credentials. Be sure to enable these features to add an extra layer of defense.

Educate Yourself and Others: Phishing attacks are often successful because users are unaware of the risks. Educating yourself and those around you about common phishing tactics can significantly reduce the likelihood of falling victim to these schemes.

Monitor Your Accounts: Regularly reviewing your account activity and enabling alerts for unusual login attempts can help you detect unauthorized access early and take action before significant damage is done.

Moving Beyond Two-Factor Authentication

As the methods used by cybercriminals continue to evolve, it may be time to rethink the effectiveness of traditional two-factor authentication. While it remains a valuable tool for securing online accounts, it is no longer enough to rely solely on SMS or email-based codes.

"It's advisable to use other, even more secure authentication methods, such as passkeys, which allow you to log in without a password, using a fingerprint, facial recognition, or a code stored on the device." These advanced authentication methods are increasingly supported by major tech companies, including Apple, Google, and Microsoft. By adopting these more secure alternatives, users can reduce their vulnerability to phishing attacks and better protect their online identities.

The Future of Cybersecurity: A Call to Action

The discovery of Astaroth and other similar phishing tools highlights the ongoing arms race between hackers and cybersecurity experts. As cybercriminals develop more sophisticated methods for bypassing security protocols, companies and individuals must stay vigilant and adopt more secure authentication methods.

The growing threat of phishing and the ability to bypass two-factor authentication systems underscores the need for continuous innovation in cybersecurity. "It's advisable to use other, even more secure authentication methods," such as biometrics and passkeys, as well as employing good cybersecurity hygiene practices, to stay ahead of evolving threats.

While two-factor authentication is still an important tool in the fight against cybercrime, it is clear that it is not enough on its own. To truly secure sensitive information and online accounts, users must embrace the latest advancements in authentication and remain vigilant in the face of increasingly sophisticated threats.


Ad Banner
Advertisement by Open Privilege
Technology
Image Credits: Unsplash
TechnologyFebruary 28, 2025 at 2:00:00 PM

Urgent Apple update shields devices from critical security flaws

[WORLD] Apple has once again demonstrated its commitment to user protection with the release of crucial updates for its popular devices. The tech...

Side Hustles
Image Credits: Unsplash
Side HustlesFebruary 21, 2025 at 3:00:00 AM

How AI makes side hustles easier and more profitable

[WORLD] Side hustles have become an increasingly popular way to supplement income, pursue passions, or test out new business ideas. As technology continues...

Technology Malaysia
Image Credits: Unsplash
TechnologyFebruary 15, 2025 at 3:30:00 PM

Why Malaysia's recent social media licenses are unsettling

[MALAYSIA] In recent years, Malaysia has witnessed significant developments in its digital landscape. However, a new regulation—social media licences—has raised alarms among citizens,...

Financial Planning
Image Credits: Unsplash
Financial PlanningFebruary 13, 2025 at 2:30:00 PM

Fake QR code scams threaten financial security

[WORLD] QR codes have become a convenient tool for linking to websites, payments, and services. These small, scannable codes, often seen in places...

Leadership
Image Credits: Unsplash
LeadershipFebruary 12, 2025 at 10:00:00 PM

How AI can assist managers in solving issues

[WORLD] Managers are tasked with making complex decisions that can affect the trajectory of their organizations. The pressure to solve problems efficiently, accurately,...

Technology
Image Credits: Unsplash
TechnologyFebruary 11, 2025 at 6:00:00 PM

Why is it so hard for AI chatbots to say "I don't know"?

[WORLD] In recent years, artificial intelligence (AI) chatbots have become an integral part of customer service, digital marketing, and other industries that require...

Technology
Image Credits: Unsplash
TechnologyFebruary 7, 2025 at 5:30:00 AM

Why you should beware about deepfake scams

[WORLD] In the digital age, technology has evolved at an astounding pace, and with it, the rise of deepfake scams. A deepfake refers...

Technology
Image Credits: Unsplash
TechnologyFebruary 5, 2025 at 6:30:00 PM

Can too much screen time make a child constantly distracted?

[WORLD] Screens are an integral part of our lives. From smartphones and tablets to computers and televisions, they offer endless entertainment, learning opportunities,...

Culture Malaysia
Image Credits: Unsplash
CultureFebruary 4, 2025 at 9:00:00 AM

Malaysians concerned about losing job to AI

[MALAYSIA] As artificial intelligence (AI) continues to advance, it is increasingly affecting various industries worldwide. For many Malaysians, the rise of AI has...

Technology
Image Credits: Unsplash
TechnologyFebruary 3, 2025 at 11:00:00 AM

DeepSeek's effect on power demand is hard to forecast, says Japan's METI

[WORLD] In recent years, the rapid advancement of artificial intelligence (AI) and machine learning technologies has sparked significant discussions about their potential to...

Technology
Image Credits: Unsplash
TechnologyFebruary 3, 2025 at 9:00:00 AM

OpenAI introduces a new AI tool to aid research tasks

[WORLD] OpenAI has unveiled a new AI tool designed to significantly enhance the research process across various fields. The tool aims to simplify...

Ad Banner
Advertisement by Open Privilege
Load More
Ad Banner
Advertisement by Open Privilege