Astaroth Phishing Kit – More Dangerous Than EvilGinx?

Mar 11, 2025 | Managed Service Providers

The Rise of Reverse Proxy Attacks: How Hackers Bypass Multi-Factor Authentication?

In the ever-evolving world of cybersecurity, a new phishing threat has emerged, making it easier for hackers to bypass security measures and gain unauthorized access to business accounts. This attack method, known as a reverse proxy attack, has been gaining traction, posing a significant risk to businesses and individuals alike.

What Makes Reverse Proxy Attacks So Dangerous?

Unlike traditional phishing attacks that aim to steal passwords, reverse proxy attacks go a step further by capturing session tokens, effectively bypassing multi-factor authentication (MFA). These attacks often masquerade as legitimate login pages for services like Microsoft, Google, or Coinbase. Once a victim enters their credentials and authentication code, the attacker gains full access to the account, potentially locking out the legitimate owner.

How Do Reverse Proxy Attacks Work?

  1. Compromised Emails: Many of these attacks start with an email from a trusted contact whose account has already been compromised. The email may contain a seemingly legitimate request, such as reviewing an invoice or accessing a document.
  2. Fake Login Page: Clicking the link directs the user to a fake but convincing Microsoft or Google login page.
  3. Multi-Factor Authentication Bypass: When the user enters their MFA code, the attacker captures it along with the session token, allowing them to bypass MFA entirely and gain full access to the account.
  4. Account Takeover: Once inside, attackers can change recovery options, reset security settings, and lock out the rightful owner. For businesses, this can lead to financial fraud, such as invoice redirection and ACH payment manipulation.

Emerging Threats: EvilGinx & The Astaroth Phishing Kit

One of the more well-known reverse proxy tools is EvilGinx, an open-source phishing framework that has been around for some time. Setting up EvilGinx requires some technical expertise, including deploying a Linux cloud server and running specific commands. However, a more recent and concerning development is the Astaroth Phishing Kit, which has simplified the process for attackers.

Key Differences Between EvilGinx and Astaroth:

  • Ease of Use: While EvilGinx requires moderate technical knowledge, Astaroth is designed for quick deployment, allowing even inexperienced hackers to set it up within an hour.
  • Cost: Astaroth is being sold on Telegram for around $2,000, making it accessible to cybercriminals.
  • Detection: Unlike EvilGinx, which is easier to detect, Astaroth leverages Cloudflare VPN tunnels and workers to create nearly undetectable phishing sites.

Protecting Your Business from Reverse Proxy Attacks

Many businesses lack the necessary security measures to prevent these types of attacks. Here are some recommended strategies to enhance your security posture:

  1. Device Filtering & Conditional Access Policies
    Implementing conditional access policies that restrict login attempts to pre-approved devices is a highly effective way to mitigate these attacks. If an unauthorized device attempts to log in, access is automatically denied.
  2. Physical Security Keys
    Hardware security keys, such as YubiKeys, provide an additional layer of authentication, ensuring that only the intended user can complete the login process.
  3. User Awareness & Training
    Educating employees on phishing tactics and how to recognize suspicious emails can significantly reduce the risk of falling victim to these attacks.
  4. Regular Security Audits
    Conducting routine security assessments helps identify vulnerabilities before attackers can exploit them.

Final Thoughts

Reverse proxy attacks represent a growing threat in the cybersecurity landscape, making it crucial for businesses to adopt advanced security measures. If you’re concerned about your organization’s security posture and want to learn more about device filtering, conditional access policies, and other protective measures, feel free to reach out.

.

Related News

Did you enjoy the article above? Did you learn anything new or find it useful? If so, you should also check out the posts below to learn more about similar topics you might find helpful and interesting. While you’re at it, consider sharing this story on your favorite social media platforms to help spread the knowledge and share what you learned with your followers!

Learn More About IT & Cyber Security from the Experts