Phishing

Bogus Microsoft ADFS Login Pages Leveraged for Widespread Credential Theft

AD Active Directory written on green key of a computer keyboard.

Hackread reports that more than 150 organizations worldwide, most of which are in the U.S., have been subjected to a new ongoing phishing campaign utilizing fraudulent Microsoft Active Directory Federation Services (ADFS) login pages to facilitate credential exfiltration.

The intrusions part of the campaign, which has been primarily targeted at the education sector, commenced with the distribution of notification-spoofing phishing emails deceiving recipients into clicking a link that redirects to a seemingly legitimate ADFS portal seeking to compromise targets' second-factor authentication, according to Abnormal Security.

Attackers further establish the legitimacy of the operation by redirecting targets to the organization's ADFS login page before proceeding with account takeover attacks exploiting VPNs. "This approach leverages nuanced psychological tactics to exploit human vulnerabilities and reinforce a false sense of legitimacy," said the report.

Such ADFS-exploiting attack was regarded to be sophisticated by KnowBe4's Roger Grimes, who urged the implementation of phishing-resistant multi-factor authentication to prevent potential compromise.

You can skip this ad in 5 seconds