Connect with us

Technology

New phishing attack uses real-time interception to bypass 2FA

Published

on

New phishing attack uses real-time interception to bypass 2FA

Phishing attacks are everywhere, and most of us can spot the obvious ones. Even if someone falls for one and hands over their password, two-factor authentication (2FA) usually adds a crucial layer of protection. But a new phishing kit making the rounds can bypass 2FA entirely by using session hijacking and real-time credential interception.

Known as Astaroth, this tool intercepts and manipulates traffic between your device and legitimate authentication services like Gmail, Yahoo and Microsoft. Since it grabs everything in real time, it completely bypasses 2FA and gives attackers full access to your account.

Stay protected & informed! Get security alerts & expert tech tips – sign up for Kurt’s The CyberGuy Report now.

Illustration of a hacker at work (Kurt “CyberGuy” Knutsson)

How Astaroth works

Astaroth is a next-level phishing kit that takes scamming to a whole new level. Instead of using basic fake login pages like traditional phishing kits, it works as a middleman between your device and the real authentication service while silently grabbing everything needed to break in.

Advertisement

The attack begins when you click on a phishing link and land on a malicious site that looks identical to the real one. Since the site has valid SSL certificates, there are no red flags, no security warnings and no sketchy pop-ups. When you enter your login details, including username, password, device info and IP address, Astaroth snatches them up before passing the request to the actual website.

Two-factor authentication is not a problem for Astaroth. It intercepts one-time passwords the second they are entered, whether they come from an authenticator app, SMS or a push notification. The stolen codes are instantly sent to the attacker through a web panel or Telegram alert, so they can use them before they expire.

The real kicker is that Astaroth also grabs session cookies, which are the small bits of data that keep users logged in after authentication. Attackers can inject these cookies into their own browsers, skipping the need for passwords or two-factor authentication altogether. Once they have the session, they are in with no extra steps required.

An example of what the victim and attacker would see (SlashNext) (Kurt “CyberGuy” Knutsson)

BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS – CYBERGUY PICKS

Advertisement

Astaroth is shockingly advanced

As reported by cybersecurity company SlashNext, Astaroth stands out from other phishing kits because of its ability to intercept credentials in real time, automate attacks and resist takedown efforts. Traditional phishing depends on tricking victims into entering their credentials on fake login pages, but Astaroth removes that step entirely. 

Beyond its advanced capabilities, Astaroth comes with features that make it appealing to cybercriminals. It uses bulletproof hosting to stay online despite law enforcement efforts, receives frequent updates to bypass security patches and follows a structured payment model. For $2,000, buyers get six months of continuous upgrades. To build trust, the creators even let hackers test the phishing kit before purchasing.

Astaroth is widely available through Telegram and underground cybercrime forums. The anonymity of these platforms makes it difficult for authorities to track distribution.

The seller sharing information on testing the phishing kit out (SlashNext) (Kurt “CyberGuy” Knutsson)

HOW TO PROTECT YOUR DATA FROM IRS SCAMMERS THIS TAX SEASON

Advertisement

Signs you may be infected with Astaroth

1) Unexpected account logins or security alerts

  • You receive alerts from Gmail, Microsoft or other services about a login from an unknown device or location
  • You get a 2FA request when you weren’t trying to log in

2) You’re mysteriously logged out of accounts

  • If your session cookies were stolen, an attacker might log in as you and force a log-out elsewhere

3) Password changes or settings updates you didn’t make

  • If an attacker has control, they may change recovery emails, phone numbers or passwords

4) Slow system performance or odd behavior

  • Astaroth uses legitimate Windows processes (like WMIC, BITSAdmin or Regsvr32) to hide itself
  • If your system is sluggish or the Task Manager shows strange processes using high CPU/network with no explanation, that could be a clue

5) Browser acting strangely

  • Login fields autopopulate incorrectly or redirect loops occur
  • Pages that used to work suddenly trigger warnings or errors

6) Unfamiliar programs or scripts running in the background

  • Check for odd Scheduled Tasks, Registry changes or background network connections (especially if they’re outbound to suspicious domains or IPs).

What to do if you suspect infection

  1. Disconnect from the internet immediately
  2. Run a full malware scan using trusted antivirus software
  3. Check for unauthorized logins on your major accounts and change all passwords on another trusted device
  4. Enable passkeys or hardware security keys where possible
  5. Reset your device if malware persists; a full factory reset may be required
  6. Monitor bank accounts and email inboxes for suspicious activity

4 ways to stay safe from Astaroth phishing attacks

1) Avoid unknown links and use strong antivirus software: Remember that no matter how advanced the malware is, it still needs input from you. In most cases, an attacker will require you to click a link before they can steal your data. For example, for Astaroth to work, you have to click a link, visit a malicious website and enter your credentials. If you don’t click the link, you stay clear of the malware.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS device.

2) Double-check sites: Always verify website addresses and use bookmarks for trusted sites. Instead of clicking on links in emails or messages, manually type the URL or use a trusted bookmark. This minimizes the risk of landing on a fraudulent page designed to mimic a legitimate website.

3) Update your devices: You might wonder how keeping your devices updated helps against malware like Astaroth. While it doesn’t directly prevent an attack, it ensures the situation doesn’t get worse. Keeping your operating system and applications up to date with the latest security patches closes vulnerabilities that malware might exploit, making it harder for attackers to gain a foothold on your device.

4) Avoid typing passwords: Avoid entering passwords whenever possible to reduce the risk of credential theft. Instead, use authentication methods like passkeys, Google Sign-In or Apple Sign-In.

Advertisement

A passkey is a feature that uses cryptographic key pairs to verify your identity, eliminating the need for traditional passwords. It allows you to sign in to apps and websites using the same process you use to unlock your device, such as biometrics, PIN or pattern.

Google Sign-In is a feature that allows you to log in to third-party apps or websites using their Google Account credentials. It simplifies the sign-in process by eliminating the need to create and remember separate usernames and passwords for each service. You can sign in via a “Sign in with Google” button, a Google sign-in prompt or automatic sign-in if previously authorized.

Apple Sign-In is a feature that enables you to privately sign in to participating third-party apps and websites using your Apple ID. It offers a fast, easy and more private way to authenticate without the need to create new accounts or remember additional passwords. To set up an account to “Sign in with Apple,” when a participating website or app asks you to set up or upgrade an account, do the following: Tap Sign in with Apple. Follow the onscreen instructions. Some apps (and websites) don’t request your name and email address. In this case, you simply authenticate with Face ID or Touch ID (depending on your model), then start using the app. Others may ask for your name and email address to set up a personalized account. When an app asks for this information, Sign in with Apple displays your name and the personal email address from your Apple Account for you to review.

These methods rely on cryptographic keys or secure tokens, making it much harder for attackers to intercept your login information, even if they manage to trick you into visiting a malicious site.

FBI WARNS OF DANGEROUS NEW ‘SMISHING’ SCAM TARGETING YOUR PHONE

Advertisement

Kurt’s key takeaway

Astaroth shows just how far phishing kits have come, taking things beyond the usual tricks and bypassing 2FA with ease. It’s a reminder that no matter how secure we think our systems are, there’s always a smarter attack waiting to exploit the gaps. Cybercriminals are adapting fast, and while traditional defenses may not cut it anymore, there are still steps you can take to fight back: use passwordless logins, stay updated and keep learning about these evolving threats. 

What do you think governments and companies should be doing to protect you from sophisticated cyber threats like the Astaroth phishing kit, which can bypass traditional security measures? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Advertisement

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Technology

TikTok ban: all the news on the app’s shutdown and return in the US

Published

on

TikTok ban: all the news on the app’s shutdown and return in the US

After briefly going dark in the US to comply with the divest-or-ban law targeting ByteDance that went into effect on January 19th, TikTok quickly came back online. It eventually reappeared in the App Store and Google Play as negotiations between the US and China continued, and Donald Trump continued to sign extensions directing officials not to apply the law’s penalties.

Finally, in mid-December, TikTok CEO Shou Zi Chew told employees that the agreements to create TikTok USDS Joint Venture LLC, which includes Oracle, Silver Lake, and MGX as part owners, have been signed, and the deal is expected to close on January 22nd, 2026. His letter said that for users in the US, the new joint venture will oversee data protection, the security of a newly-retrained algorithm, content moderation, and the deployment of the US app and platform.

Read on for all the latest news on the TikTok ban law in the US.

Continue Reading

Technology

Secret phrases to get you past AI bot customer service

Published

on

Secret phrases to get you past AI bot customer service

NEWYou can now listen to Fox News articles!

You’re gonna love me for this. 

Say you’re calling customer service because you need help. Maybe your bill is wrong, your service is down or you want a refund. Instead of a person, a cheerful AI voice answers and drops you into an endless loop of menus and misunderstood prompts. Now what?  

That’s not an accident. Many companies use what insiders call “frustration AI.” The system is specifically designed to exhaust you until you hang up and walk away.

Not today.  (Get more tips like this at GetKim.com)

Advertisement

FOX NEWS POLL: VOTERS SAY GO SLOW ON AI DEVELOPMENT — BUT DON’T KNOW WHO SHOULD STEER

Here are a few ways to bypass “frustration” AI bots. (Sebastian Kahnert/picture alliance via Getty Images)

Use the magic words

You want a human. For starters, don’t explain your issue. That’s the trap. You need words the AI has been programmed to treat differently.

Nuclear phrases: When the AI bot asks why you’re calling, say, “I need to cancel my service” or “I am returning a call.” The word cancel sets off alarms and often sends you straight to the customer retention team. Saying you’re returning a call signals an existing issue the bot cannot track. I used that last weekend when my internet went down, and, bam, I had a human.

Power words: When the system starts listing options, clearly say one word: “Supervisor.” If that doesn’t work, say, “I need to file a formal complaint.” Most systems are not programmed to deal with complaints or supervisors. They escalate fast.

Advertisement

Technical bypass: Asked to enter your account number? Press the pound key (#) instead of numbers. Many older systems treat unexpected input as an error and default to a human.

OPENAI ANNOUNCES UPGRADES FOR CHATGPT IMAGES WITH ‘4X FASTER GENERATION SPEED’

“Supervisor” is one magic word that can get you a human on the other end of the line. (Neil Godwin/Future via Getty Images)

Go above the bots

If direct commands fail with AI, be a confused human.

The Frustration Act: When the AI bot asks a question, pause. Wait 10 seconds before answering. These systems are built for fast, clean responses. Long pauses often break the flow and send your call to a human.

Advertisement

The Unintelligible Bypass: Stuck in a loop? Act like your phone connection is terrible. Say garbled words or nonsense. After the system says, “I’m having trouble understanding you” three times, many bots automatically transfer you to a live agent.

The Language Barrier Trick: If the company offers multiple languages, choose one that’s not your primary language or does not match your accent. The AI often gives up quickly and routes you to a human trained to handle language issues.

Use these tricks when you need help. You are calling for service, not an AI bot.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Long pauses and garbled language can also get you referred to a human. (iStock)

Advertisement

Get tech-smarter on your schedule

  • National radio: Airing on 500-plus stations across the U.S. Find yours or get the free podcast.
  • Daily newsletter: Join 650,000 people who read the Current (free!)
  • Watch: On Kim’s YouTube channel

Award-winning host Kim Komando is your secret weapon for navigating tech.

Copyright 2026, WestStar Multimedia Entertainment. All rights reserved. 

Continue Reading

Technology

The latest iPad Air is $400 for the first time and arrives by Christmas

Published

on

The latest iPad Air is 0 for the first time and arrives by Christmas

If you have $400 and want an iPad, your options are usually kind of limited to either just the base iPad, or better yet, the latest iPad Mini — if it happens to be on sale when you’re shopping (it is now, but that’s not always the case). But right now, you should consider getting the 128GB version of Apple’s 11-inch iPad Air with the capable M3 processor. At Target, multiple colors of this model are $399.99, beating the previous low of $449.99 we’ve seen during large-scale deal events. Currently, no other retailer is matching this price. This sale ends Saturday night.

$400 is a sweet price for this model, as it debuted in early 2025 for $600. In terms of how it stacks up to other iPad models, Verge editor-at-large David Pierce said in his impressions that the M3 Air is “exactly what you think it is. Which is fine.” I know, that sounds like a back-handed compliment, but it’s been a while since iPads peaked in terms of utility, design, and fast performance. This one carries the torch in Apple’s tablet dominance, and its M3 processor means it’ll be a fantastic tablet for longer than any other iPad at the $400 price point. Read our in-depth impressions.

Other Verge-approved deals

Continue Reading

Trending