Analyzing the latest Sneaky2FA Browser-in-the-Browser phishing page

Analyzing the latest Sneaky2FA Browser-in-the-Browser phishing page pushsecurity.com/blog/anal…

Attackers are continuously innovating their phishing techniques, particularly in the context of an increasingly professionalized PhaaS ecosystem. With identity-based attacks continuing to be the leading cause of breaches, attackers are incentivized to refine and enhance their phishing infrastructure.

The addition of BITB, with the frequent iteration and improvement of detection evasion techniques, means that traditional security controls such as email gateways, web filters, and signature-based defenses will continue to be reliably bypassed.

Edward Kiledjian @ekiledjian