Attackers Bypass MFA With New Phishing Method

February 23, 2022

Attackers now use remote code access software and browsers to bypass multi-factor authentication (MFA).

The new method was revealed by security researcher “mr.d0x.” While performing penetration tests for a phishing attack, mr.d0x used the Evilginx2 attack framework.

The framework acts as a reverse proxy to steal login credentials and MFA codes, but Google’s new security feature prevented login once reverse proxies or man-in-the-middle (MiTM) were detected.

To bypass Google’s security update, mr.d0x implemented a new phishing method using noVNC remote access software and browser.

In kiosk mode, the remote software displays e-mail login prompts that run on the attacker’s server but are displayed in the victim’s browser.

In his explanation of how noVNC can be used to steal credentials, mr.d0x pointed out that attackers: “Need to setup a server with noVNC, run Firefox or another browser in kiosk mode and go to the website that the user wants to authenticate at e.g. google.com. Send the link to the target user, and when the user clicks the URL, they access the VNC session without noticing, and because you have already set up Firefox in kiosk mode, the user will only see a web page as expected.”

For more information, read the original story in BleepingComputer.

Top Stories

Related Articles

December 30, 2025 A fast-moving cyberattack has compromised more than 59,000 internet-facing Next.js servers in less than two days after more...

December 29, 2025 The U.S. National Institute of Standards and Technology (NIST) has warned that several of its Internet Time more...

December 29, 2025 A critical security flaw has been found in LangChain, one of the most widely used frameworks for more...

December 23, 2025 South Korea will require facial recognition scans to open new mobile phone accounts. The new rule is more...

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn