Attackers have a new way to slip past your MFA
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。用户已经提供了文章内容,所以我先快速浏览一下。 文章主要讲的是Evilginx这个工具被攻击者用来窃取会话cookie,绕过多因素认证。攻击者通过中间人钓鱼手段,让受害者输入账号密码和MFA代码,然后获取会话cookie,进而冒充用户进行恶意操作。 接下来,我需要提取关键点:Evilginx、窃取会话cookie、绕过MFA、攻击教育机构、攻击流程、防范措施等。然后把这些信息浓缩到100字以内。 要注意不要使用“文章内容总结”这样的开头,直接描述即可。可能的结构是:Evilginx工具如何被利用,导致的安全威胁,以及防范建议。 最后检查字数是否符合要求,并确保信息准确简洁。 </think> 攻击者利用Evilginx工具窃取会话cookie,绕过多因素认证(MFA),对教育机构等目标发起钓鱼攻击。该工具作为中间人代理,伪装真实网站获取用户凭证和会话cookie,使攻击者可冒充用户进行恶意操作。防范措施包括谨慎点击可疑链接、使用实时反恶意软件保护、启用抗钓鱼的MFA方法(如硬件密钥或Passkeys)以及及时撤销可疑会话。 2025-12-3 15:44:13 Author: www.malwarebytes.com(查看原文) 阅读量:4 收藏

Attackers are using a tool called Evilginx to steal session cookies, letting them bypass the need for a multi-factor authentication (MFA) token.

Researchers are warning about a rise in cases where this method is used against educational institutions.

Evilginx is an attacker-in-the-middle phishing toolkit that sits between you and the real website, relaying the genuine sign-in flow so everything looks normal while it captures what it needs. Because it sends your input to the real service, it can collect your username and password, as well as the session cookie issued after you complete MFA.

Session cookies are temporary files websites use to remember what you’re doing during a single browsing session–like staying signed in or keeping items in a shopping cart. They are stored in the browser’s memory and are automatically deleted when the user closes their browser or logs out, making them less of a security risk than persistent cookies. But with a valid session cookie the attacker can keep the session alive and continue as if they were you. Which, on a web shop or banking site could turn out to be costly.

Attack flow

The attacker sends you a link to a fake page that looks exactly the same as, for example, a bank login page, web shop, or your email or company’s single sign-on (SSO) page. In reality, the page is a live proxy to the real site.

Unaware of the difference, you enter your username, password, and MFA code as usual. The proxy relays this to the real site which grants access and sets a session cookie that says “this user is authenticated.”

But Evilginx isn’t just stealing your login details, it also captures the session cookie. The attacker can reuse it to impersonate you, often without triggering another MFA prompt.

Once inside, attackers can browse your email, change security settings, move money, and steal data. And because the session cookie says you’re already verified, you may not see another MFA challenge. They stay in until the session expires or is revoked.

Banks often add extra checks here. They may ask for another MFA code when you approve a payment, even if you’re already signed in. It’s called step-up authentication. It helps reduce fraud and meets Strong Customer Authentication rules by adding friction to high-risk actions like transferring money or changing payment details.

How to stay safe

Because Evilginx proxies the real site with valid TLS and live content, the page looks and behaves correctly, defeating simple “look for the padlock” advice and some automated checks.

Attackers often use links that live only for a very short time, so they disappear again before anyone can add them to a block list.​ Security tools then have to rely on how these links and sites behave in real time, but behavior‑based detection is never perfect and can still miss some attacks.

So, what you can and should do to stay safe is:

  • Be careful with links that arrive in an unusual way. Don’t click until you’ve checked the sender and hovered over the destination. When in doubt, feel free to use Malwarebytes Scam Guard on mobiles to find out whether it’s a scam or not. It will give you actionable advice on how to proceed.
  • Use up-to-date real-time anti-malware protection with a web component.
  • Use a password manager. It only auto-fills passwords on the exact domain they were saved for, so they usually refuse to do this on look‑alike phishing domains such as paypa1[.]com or micros0ft[.]com. But Evilginx is trickier because it sits in the middle while you talk to the real site, so this is not always enough.
  • Where possible, use phishing-resistant MFA. Passkeys or hardware security keys, which bind authentication to your device are resistant to this type of replay.
  • Revoke sessions if you notice something suspicious. Sign out of all sessions and re-login with MFA. Then change your password and review account recovery settings.

Pro tip: Malwarebytes Browser Guard is a free browser extension that can detect malicious behavior on web sites.


We don’t just report on threats—we help safeguard your entire digital identity

Cybersecurity risks should never spread beyond a headline. Protect your, and your family’s, personal information by using identity protection.

About the author

Was a Microsoft MVP in consumer security for 12 years running. Can speak four languages. Smells of rich mahogany and leather-bound books.


文章来源: https://www.malwarebytes.com/blog/news/2025/12/attackers-have-a-new-way-to-slip-past-your-mfa
如有侵权请联系:admin#unsafe.sh