Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    The most durable USB-C cable I’ve tested so far is only $11 this weekend (and I’ll be buying several)

    November 30, 2025

    Finally, an Android tablet that I wouldn’t mind keeping my iPad Pro for (especially at this price)

    November 30, 2025

    How much RAM will your PC really need in 2025? A Windows and Mac expert’s view

    November 30, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»Danger actors downed Fido2 MFA in poison fishing attack
    Security

    Danger actors downed Fido2 MFA in poison fishing attack

    PineapplesUpdateBy PineapplesUpdateJuly 19, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Danger actors downed Fido2 MFA in poison fishing attack
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Danger actors downed Fido2 MFA in poison fishing attack

    A poison phishing campaign Fido2 Security is by misusing the security of security to the security of the fake company portals by misusing the Cross-device sign-in facility to the security.

    Poison danger actors are known to appoint large amounts of fishing attacks for financial fraud. In the past, distributing emails with crypto seed phrases is used to dry the cryptocurrency wallet.

    In recent fishing attack ExpelledActor with poison-threatened actor does not take advantage of a defect in the protection of Fido2, but misuse a valid cross-device authentication facility.

    Cross-device authentication is a webauthn feature that allows users to sign on a device using the safety key or authentication app on another device. Instead of the need for a physical connection, such as plugged into the safety key, the authentication request is transmitted between the equipment via Bluetooth or QR code scan.

    The attack begins by directing users on a fishing site that applies the corporate login portal, such as OCTA or Microsoft 365.

    When the user enters its credentials in the portal, the campaign uses an adverse-in-media (AITM) backnd to quietly log in with credentials presented on a valid login portal in real time.

    The targeted user in the attack will normally use its Fido2 security key to verify multi-factor authentication requests. However, Fishing Backand explains the valid login portal to certify using cross-device authentication instead.

    It causes a valid portal to generate a QR code, which is sent back to the fishing page and displayed to the user.

    When the user scans this QR code using its smartphone or certification app, it approves the login effort launched by the attacker.

    Poison attack flow to bypass fido2 security
    Poison attack flow to bypass fido2 security
    Source: Expeling

    This method effectively bypasses the fido2 security security by allowing attackers to initiate a login flow which depends on cross-device authentication rather than the user’s physical fido2 key.

    The expulsion warns that the attack does not take advantage of a defect in the Fido2 implementation, but rather misuses a valid feat that downgrade the Fido major authentication process.

    To reduce the risk, the expulsion recommends the following rescue:

    • Limiting geographical locations, allowing users to log in and establish a registration process for traveling individuals.
    • Regularly check for registration of unknown Fido key from unknown locations and unusual safety major brands.
    • Organizations can consider applying Bluetooth-based certification as a requirement for cross-device authentication, which significantly reduces the effectiveness of distant fishing attacks.

    The expulsion also saw a separate incident, where a danger actor recorded his Fido key after compromising an account through an account to reset fishing and password. However, this attack did not require any method to trick the user like the QR code.

    This attack highlights how the danger actor users are looking for ways to bypass the phishing-resistant authentication in completing the login flow to bypass the need for physical interaction with the safety key.


    Knowledgeable

    Include emerging hazards in real time – before they affect your business.

    Learn how cloud detection and response (CDR) gives security teams the required edge in this practical, no-nonsense guide.

    actors Attack danger downed Fido2 Fishing MFA Poison
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous Article7 Cool things I do with my monitor’s USB port
    Next Article 3 Best Comedy on Netflix to see at the end of this week – all 90% or more on rotten tomatoes
    PineapplesUpdate
    • Website

    Related Posts

    Security

    Your Uber driver has a new endeavor: training an AI for cash

    October 18, 2025
    Security

    American Airlines subsidiary Envoy confirms Oracle data breach attack

    October 18, 2025
    Security

    Government considers destroying its data hub after decade-long intrusion

    October 18, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    The most durable USB-C cable I’ve tested so far is only $11 this weekend (and I’ll be buying several)

    November 30, 2025

    Finally, an Android tablet that I wouldn’t mind keeping my iPad Pro for (especially at this price)

    November 30, 2025

    How much RAM will your PC really need in 2025? A Windows and Mac expert’s view

    November 30, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.