Friday, August 29, 2025

Risk actors downgrade FIDO2 MFA auth in PoisonSeed phishing assault


A PoisonSeed phishing marketing campaign is bypassing FIDO2 safety key protections by abusing the cross-device sign-in function in WebAuthn to trick customers into approving login authentication requests from faux firm portals.

The PoisonSeed menace actors are identified to make use of large-volume phishing assaults for monetary fraud. Previously, distributing emails containing crypto seed phrases used to empty cryptocurrency wallets.

Within the latest phishing assault noticed by Expel, the PoisonSeed menace actors don’t exploit a flaw in FIDO2’s safety however reasonably abuse the authentic cross-device authentication function.

Cross-device authentication is a WebAuthn function that enables customers to register on one machine utilizing a safety key or authentication app on one other machine. As a substitute of requiring a bodily connection, equivalent to plugging in a safety key, the authentication request is transmitted between units through Bluetooth or a QR code scan.

The assault begins by directing customers to a phishing web site that impersonates company login portals, equivalent to from Okta or Microsoft 365.

When the consumer enters their credentials into the portal, the marketing campaign makes use of an adversary-in-the-middle (AiTM) backend to silently log in with the submitted credentials on the authentic login portal in real-time.

The consumer focused within the assault usually would use their FIDO2 safety keys to confirm multi-factor authentication requests. Nonetheless, the phishing backend as a substitute tells the authentic login portal to authenticate utilizing cross-device authentication.

This causes the authentic portal to generate a QR code, which is transmitted again to the phishing web page and exhibited to the consumer.

When the consumer scans this QR code utilizing their smartphone or authentication app, it approves the login try initiated by the attacker.

PoisonSeed attack flow to bypass FIDO2 protections
PoisonSeed assault move to bypass FIDO2 protections
Supply: Expel

This technique successfully bypasses FIDO2 safety key protections by permitting attackers to provoke a login move that depends on cross-device authentication as a substitute of the consumer’s bodily FIDO2 key.

Expel warns that this assault doesn’t exploit a flaw within the FIDO2 implementation, however as a substitute abuses a authentic function that downgrades the FIDO key authentication course of.

To mitigate the chance, Expel recommends the next defenses:

  • Limiting geographic places from which customers are allowed to log in and establishing a registration course of for people touring.
  • Routinely test for the registration of unknown FIDO keys from unknown places and unusual safety key manufacturers.
  • Organizations can think about implementing Bluetooth-based authentication as a requirement for cross-device authentication, which considerably reduces the effectiveness of distant phishing assaults.

Expel additionally noticed a separate incident the place a menace actor registered their very own FIDO key after compromising an account through what’s believed to be phishing and resetting the password. Nonetheless, this assault didn’t require any strategies to trick the consumer, like a QR code.

This assault highlights how menace actors are discovering methods to bypass phishing-resistant authentication by tricking customers into finishing login flows that bypass the necessity for bodily interplay with a safety key.

Comprise rising threats in actual time – earlier than they affect your online business.

Find out how cloud detection and response (CDR) offers safety groups the sting they want on this sensible, no-nonsense information.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles

PHP Code Snippets Powered By : XYZScripts.com