This brutal hacking tool could steal virtually all of your logins

Representational image depecting cybersecurity protection
(Image credit: Shutterstock)

A new hacking tool can supposedly beat any security protections set up to prevent cyberattacks, and gain access to some of the world's most popular websites, reports suggest.

The operator behind the EvilProxy tool says it is able to steal the authentication tokens needed to bypass the multi-factor authentication (MFA) systems used by the likes of Apple, Google, Facebook, Microsoft, and Twitter.

The service is particularly concerning as it promises to make such attacks available to all hackers, even those who may not have the precise skills or knowledge needed to attack such prominent targets.

Phishing threat

The tool was discovered by security firm Resecurity, which notes that EvilProxy (also known as Moloch) is a reverse-proxy Phishing-as-a-Service (PaaS) platform being advertised on the dark web.

It offers to steal usernames, passwords, and session cookies, for a cost of $150 for ten days, $250 for 20 days, or $400 for a month-long campaign - although attacks against Google attacks will cost more, coming in at $250, $450 and $600 respectively.

Reverse proxies typically sit between a website and some form of online authentication endpoint such as a login page. EvilProxy tricks its victims using phishing lures, taking them to a legitimate page where they are asked to enter login credentials and MFA information. This data is then sent to the intended, legitimate website, logging them in, and also generating a session cookie containing an authentication token, which is sent to the victim.

However, this cookie and the authentication token can then be stolen by the reverse proxy, which, as noted, is located in between the user and the legitimate website. The attackers can then use this token in order to log in to the site masquerading as their victim, bypassing the need to re-enter information on the MFA process.

Resecurity notes that aside from the cleverness of the attack itself, which is simpler to deploy than other man-in-the-middle (MITM) attacks, what also sets EvilProxy apart is its user-friendly approach. After purchasing, customers are given detailed instructional videos and tutorials on how to use the tool, which boasts a clear and open graphical interface where users can set up and manage their phishing campaigns.

It also offers a library of existing cloned phishing pages for popular internet services, which along with the names mentioned above, include the likes of GoDaddy, GitHub, Dropbox, Instagram, Yahoo and Yandex.

"While the sale of EvilProxy requires vetting, cybercriminals now have a cost-effective and scalable solution to perform advanced phishing attacks to compromise consumers of popular online services with enabled MFA," Resecurity noted. 

"The appearance of such services in the dark web will lead to a significant increase in ATO/BEC activity and cyberattacks targeting the identity of the end users, where MFA may be easily bypassed with the help of tools like EvilProxy."

Via BleepingComputer

Mike Moore
Deputy Editor, TechRadar Pro

Mike Moore is Deputy Editor at TechRadar Pro. He has worked as a B2B and B2C tech journalist for nearly a decade, including at one of the UK's leading national newspapers and fellow Future title ITProPortal, and when he's not keeping track of all the latest enterprise and workplace trends, can most likely be found watching, following or taking part in some kind of sport.

Read more
Representational image of a shrouded hacker.
Getting to grips with Adversary-in-the-Middle threats
A fish hook is lying across a computer keyboard, representing a phishing attack on a computer system
Microsoft authentication system spoofed via phishing attack
Security padlock in circuit board, digital encryption concept
MFA alone won’t protect you in 2025: the new cybersecurity imperative
A concept image of someone typing on a computer. A red flashing danger sign is above the keyboard and nymbers and symbols also in glowing red surround it.
Microsoft Teams and other Windows tools hijacked to hack corporate networks
A fish hook is lying across a computer keyboard, representing a phishing attack on a computer system
A new Microsoft 365 phishing service has emerged, so be on your guard
Robotic hand clicking on captcha 'I am not a robot'.
Double clicking danger - experts warn just two clicks can let attackers steal your accounts
Latest in Security
An American flag flying outside the US Capitol building against a blue sky
Sean Plankey selected as CISA director by President Trump
Ai tech, businessman show virtual graphic Global Internet connect Chatgpt Chat with AI, Artificial Intelligence.
Nation-state threats are targeting UK AI research
Scam alert
Fake jobs and phone calls: How Americans lost $12.5 bn to fraud in 2024
Application Security Testing Concept with Digital Magnifying Glass Scanning Applications to Detect Vulnerabilities - AST - Process of Making Apps Resistant to Security Threats - 3D Illustration
Google bug bounty payments hit nearly $12 million in 2024
Scam alert
A new SMS energy scam is using Elon Musk’s face to steal your money
Representational image of a cybercriminal
Allstate sued for exposing personal customer information in plaintext
Latest in News
Man having Windows 11 problems with his laptop
Fed up of adverts creeping into Windows 11? You won’t like Microsoft’s latest update, then, although it does provide some important bug fixes
Apple Siri
Update your Apple device now: iOS 18.3.2 fixes a flaw that could be exploited by hackers
Google Chromecast 2
Chromecasts are still broken – but Google tells fuming owners not to factory reset their devices
ChatGPT
ChatGPT wants to write your next novel, and readers and writers alike should be very worried
Garmin Instinct 3 next to the Apple Watch Ultra 2
New figures claim the smartwatch market just shrunk for the first time ever, and the Apple Watch Ultra 3 is to blame
Hitman: World of Assassination on PSVR 2.
Hitman: World of Assassination hits PSVR 2 soon, finally giving you a reason to dust off your headset