Screen sharing software can bypass MFA and put you at risk of cyberattacks

Ein Passworteingabefeld mit 9 Sternchen
(Image credit: (stock.adobe.com © jamdesign))

A cybersecurity researcher has discovered a new and dangerous way to abuse online collaboration software to bypass multi-factor authentication (MFA) and compromise otherwise secure accounts. 

The researcher, who goes by the name mr.dox, stumbled upon the idea when doing penetration testing for a customer.

Usually, MFA is a great way to protect an account from phishing because even if the victim ends up on a fake landing page and enters their login credentials, their account is still protected by the one-time passcode.

TechRadar needs you!

We're looking at how our readers use VPNs with different devices so we can improve our content and offer better advice. This survey shouldn't take more than 60 seconds of your time. Thank you for taking part.

>> Click here to start the survey in a new window <<

It's not your browser

However, what if the victim was actually accessing a noVNC session, with Firefox (or any other browser, for that matter) in kiosk mode, instead of accessing the website in the browser on their own device? 

That’s exactly what mr.dox succeeded in doing. NoVNC is, in the simplest possible terms, a remote desktop program, one that allows users to connect to a VNC (Virtual Network Computing) server directly from a browser, by simply clicking a link.

In theory, an attacker can craft a phishing email notifying the target of a new, unread message on their LinkedIn account. The email would carry a “Log in here” link which would bring up the noVNC session, and the browser in kiosk mode. That way, all the user will see is a web page, as they’d expect. 

After logging in (and even submitting their MFA key), the attacker can use various tools to steal passwords and security keys. What’s even more dangerous is the fact that some services require MFA only once, and after authorizing the device, the password would suffice.

Also, VNC allows more than one person to monitor the same session, potentially allowing the attackers to disconnect the victim’s session after logging in, and then reconnect at a later date.

Speaking with BleepingComputer, the researcher said the attack is still theoretical as it hasn’t been observed in the wild, but he believes it’s only a matter of time before it does. 

As for security measures - they’re always the same with phishing. Don’t download any email attachments, and don’t open any email links, unless absolutely certain of the authenticity of the sender and their good intentions.

Via: BleepingComputer

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
Representational image of a shrouded hacker.
Getting to grips with Adversary-in-the-Middle threats
Security padlock in circuit board, digital encryption concept
MFA alone won’t protect you in 2025: the new cybersecurity imperative
Robotic hand clicking on captcha &#039;I am not a robot&#039;.
Double clicking danger - experts warn just two clicks can let attackers steal your accounts
Fraude en ligne phishing
Google forced to step up phishing defenses following ‘most sophisticated attack’ it has ever seen
A fish hook is lying across a computer keyboard, representing a phishing attack on a computer system
Microsoft authentication system spoofed via phishing attack
A fish hook is lying across a computer keyboard, representing a phishing attack on a computer system
Everything you need to know about phishing
Latest in Security
cybersecurity
Chinese government hackers allegedly spent years undetected in foreign phone networks
Data leak
A major Keenetic router data leak could put a million households at risk
Code Skull
Interpol operation arrests 300 suspects linked to African cybercrime rings
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
Multiple routers hit by new critical severity remote command injection vulnerability, with no fix in sight
Code Skull
This dangerous new ransomware is hitting Windows, ARM, ESXi systems
An abstract image of a lock against a digital background, denoting cybersecurity.
Critical security flaw in Next.js could spell big trouble for JavaScript users
Latest in News
Zotac Gaming RTX 5090 Graphics Card
Nvidia Blackwell stock woes are compounded by price hikes as more RTX 5090 GPUs soar in pricing, and I’m sick and tired of it all at this point
A collage of Elizabeth Olsen&#039;s Scarlet Witch and Tatiana Maslany&#039;s She-Hulk
Marvel fans are already tired of Doomsday and Secret Wars cast gossip as two more superheroes get linked with roles in the next two Avengers movies
Four operators survey Verdansk. One holds a sniper rifle, one binoculars, another holds is landing with their parachute, while the last wears a skull mask
New Call of Duty: Warzone trailer shows a beautiful rebuilt Verdansk, but some fans want more: 'it won't be the same unfortunately'
An Apple Music pink/pixellated poster advertising DJ with Apple Music
DJ with Apple Music lands, allowing subscribers to build and mix DJ sets directly from its +100 million-song catalog
The Meta Quest 3 and controllers on their charging station which is itself on a wooden desk next to a lamp
Forget Android XR, I've got my eyes on Vivo's new Meta Quest 3 competitor as it could be the most important VR headset of 2025
Samsung Galaxy S25 from the front
The Now Bar on Samsung One UI 7 is about to get a lot more useful – and could soon match Live Activities on iOS