A new phishing campaign is exploiting Microsoft's legacy ADFS identity solution to steal credentials and bypass MFA
Briefly

A research report from Abnormal Security reveals a phishing campaign targeting Microsoft's Active Directory Federation Services (ADFS), a single sign-on solution. Hackers are spoofing ADFS sign-in pages to trick users into providing their credentials and second-factor authentication details. This campaign uses well-crafted phishing emails that appear to come from trusted sources, such as the IT helpdesk. The attackers also employ obfuscated URLs and mimic specific branding from the organization’s legitimate login portals to deceive victims effectively. Additionally, they retrieve logos and elements directly from the respective organization’s websites for authenticity, enhancing the likelihood of success.
Hackers are exploiting Microsoft's Active Directory Federation Services (ADFS) through sophisticated phishing techniques, successfully tricking employees into revealing their credentials and second-factor authentication details.
Using highly convincing emails and spoofed ADfS sign-in pages, attackers mimic trusted IT notifications, leading victims to enter sensitive information onto fake websites crafted to reflect their organization's login portal.
The phishing campaign thrives on obfuscated URLs that mimic legitimate link structures, avoiding detection while creating a sense of urgency that prompts victims to act quickly.
Read at ITPro
[
|
]