Technology
New phishing attack uses real-time interception to bypass 2FA
Phishing attacks are everywhere, and most of us can spot the obvious ones. Even if someone falls for one and hands over their password, two-factor authentication (2FA) usually adds a crucial layer of protection. But a new phishing kit making the rounds can bypass 2FA entirely by using session hijacking and real-time credential interception.
Known as Astaroth, this tool intercepts and manipulates traffic between your device and legitimate authentication services like Gmail, Yahoo and Microsoft. Since it grabs everything in real time, it completely bypasses 2FA and gives attackers full access to your account.
Stay protected & informed! Get security alerts & expert tech tips – sign up for Kurt’s The CyberGuy Report now.
Illustration of a hacker at work (Kurt “CyberGuy” Knutsson)
How Astaroth works
Astaroth is a next-level phishing kit that takes scamming to a whole new level. Instead of using basic fake login pages like traditional phishing kits, it works as a middleman between your device and the real authentication service while silently grabbing everything needed to break in.
The attack begins when you click on a phishing link and land on a malicious site that looks identical to the real one. Since the site has valid SSL certificates, there are no red flags, no security warnings and no sketchy pop-ups. When you enter your login details, including username, password, device info and IP address, Astaroth snatches them up before passing the request to the actual website.
Two-factor authentication is not a problem for Astaroth. It intercepts one-time passwords the second they are entered, whether they come from an authenticator app, SMS or a push notification. The stolen codes are instantly sent to the attacker through a web panel or Telegram alert, so they can use them before they expire.
The real kicker is that Astaroth also grabs session cookies, which are the small bits of data that keep users logged in after authentication. Attackers can inject these cookies into their own browsers, skipping the need for passwords or two-factor authentication altogether. Once they have the session, they are in with no extra steps required.
An example of what the victim and attacker would see (SlashNext) (Kurt “CyberGuy” Knutsson)
BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS – CYBERGUY PICKS
Astaroth is shockingly advanced
As reported by cybersecurity company SlashNext, Astaroth stands out from other phishing kits because of its ability to intercept credentials in real time, automate attacks and resist takedown efforts. Traditional phishing depends on tricking victims into entering their credentials on fake login pages, but Astaroth removes that step entirely.
Beyond its advanced capabilities, Astaroth comes with features that make it appealing to cybercriminals. It uses bulletproof hosting to stay online despite law enforcement efforts, receives frequent updates to bypass security patches and follows a structured payment model. For $2,000, buyers get six months of continuous upgrades. To build trust, the creators even let hackers test the phishing kit before purchasing.
Astaroth is widely available through Telegram and underground cybercrime forums. The anonymity of these platforms makes it difficult for authorities to track distribution.
The seller sharing information on testing the phishing kit out (SlashNext) (Kurt “CyberGuy” Knutsson)
HOW TO PROTECT YOUR DATA FROM IRS SCAMMERS THIS TAX SEASON
Signs you may be infected with Astaroth
1) Unexpected account logins or security alerts
- You receive alerts from Gmail, Microsoft or other services about a login from an unknown device or location
- You get a 2FA request when you weren’t trying to log in
2) You’re mysteriously logged out of accounts
- If your session cookies were stolen, an attacker might log in as you and force a log-out elsewhere
3) Password changes or settings updates you didn’t make
- If an attacker has control, they may change recovery emails, phone numbers or passwords
4) Slow system performance or odd behavior
- Astaroth uses legitimate Windows processes (like WMIC, BITSAdmin or Regsvr32) to hide itself
- If your system is sluggish or the Task Manager shows strange processes using high CPU/network with no explanation, that could be a clue
5) Browser acting strangely
- Login fields autopopulate incorrectly or redirect loops occur
- Pages that used to work suddenly trigger warnings or errors
6) Unfamiliar programs or scripts running in the background
- Check for odd Scheduled Tasks, Registry changes or background network connections (especially if they’re outbound to suspicious domains or IPs).
What to do if you suspect infection
- Disconnect from the internet immediately
- Run a full malware scan using trusted antivirus software
- Check for unauthorized logins on your major accounts and change all passwords on another trusted device
- Enable passkeys or hardware security keys where possible
- Reset your device if malware persists; a full factory reset may be required
- Monitor bank accounts and email inboxes for suspicious activity
4 ways to stay safe from Astaroth phishing attacks
1) Avoid unknown links and use strong antivirus software: Remember that no matter how advanced the malware is, it still needs input from you. In most cases, an attacker will require you to click a link before they can steal your data. For example, for Astaroth to work, you have to click a link, visit a malicious website and enter your credentials. If you don’t click the link, you stay clear of the malware.
The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS device.
2) Double-check sites: Always verify website addresses and use bookmarks for trusted sites. Instead of clicking on links in emails or messages, manually type the URL or use a trusted bookmark. This minimizes the risk of landing on a fraudulent page designed to mimic a legitimate website.
3) Update your devices: You might wonder how keeping your devices updated helps against malware like Astaroth. While it doesn’t directly prevent an attack, it ensures the situation doesn’t get worse. Keeping your operating system and applications up to date with the latest security patches closes vulnerabilities that malware might exploit, making it harder for attackers to gain a foothold on your device.
4) Avoid typing passwords: Avoid entering passwords whenever possible to reduce the risk of credential theft. Instead, use authentication methods like passkeys, Google Sign-In or Apple Sign-In.
A passkey is a feature that uses cryptographic key pairs to verify your identity, eliminating the need for traditional passwords. It allows you to sign in to apps and websites using the same process you use to unlock your device, such as biometrics, PIN or pattern.
Google Sign-In is a feature that allows you to log in to third-party apps or websites using their Google Account credentials. It simplifies the sign-in process by eliminating the need to create and remember separate usernames and passwords for each service. You can sign in via a “Sign in with Google” button, a Google sign-in prompt or automatic sign-in if previously authorized.
Apple Sign-In is a feature that enables you to privately sign in to participating third-party apps and websites using your Apple ID. It offers a fast, easy and more private way to authenticate without the need to create new accounts or remember additional passwords. To set up an account to “Sign in with Apple,” when a participating website or app asks you to set up or upgrade an account, do the following: Tap Sign in with Apple. Follow the onscreen instructions. Some apps (and websites) don’t request your name and email address. In this case, you simply authenticate with Face ID or Touch ID (depending on your model), then start using the app. Others may ask for your name and email address to set up a personalized account. When an app asks for this information, Sign in with Apple displays your name and the personal email address from your Apple Account for you to review.
These methods rely on cryptographic keys or secure tokens, making it much harder for attackers to intercept your login information, even if they manage to trick you into visiting a malicious site.
FBI WARNS OF DANGEROUS NEW ‘SMISHING’ SCAM TARGETING YOUR PHONE
Kurt’s key takeaway
Astaroth shows just how far phishing kits have come, taking things beyond the usual tricks and bypassing 2FA with ease. It’s a reminder that no matter how secure we think our systems are, there’s always a smarter attack waiting to exploit the gaps. Cybercriminals are adapting fast, and while traditional defenses may not cut it anymore, there are still steps you can take to fight back: use passwordless logins, stay updated and keep learning about these evolving threats.
What do you think governments and companies should be doing to protect you from sophisticated cyber threats like the Astaroth phishing kit, which can bypass traditional security measures? Let us know by writing us at Cyberguy.com/Contact.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what stories you’d like us to cover.
Follow Kurt on his social channels:
Answers to the most-asked CyberGuy questions:
New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.
Technology
It’s amazing how good Alienware’s $350 OLED monitor is
I’ve recommended several OLED gaming monitors to readers over the years, and I’ve finally taken my own advice to buy one. Alienware’s new 27-inch 1440p QD-OLED has all the features that I want and a low $350 price that was too tempting to ignore.
The AW2726DM model has five things that make it stand out for the price: a 1440p QD-OLED screen with lush contrast, a fast 240Hz refresh rate, a semi-glossy screen coating to enhance details, a low-profile design without flashy RGB LEDs, and a great warranty (three years with coverage for burn-in).
I’ve been using Alienware’s new monitor for a couple days, and I’ve already spent hours with it playing Marathon. It was my first opportunity to see Bungie’s new first-person extraction shooter in its full HDR glory, and I can never go back. Switching on HDR wasn’t automatic, though it already looked so much better than my IPS panel without being activated.
Enabling it transformed how Marathon looked for the better, but made everything else about the OS look pretty washed-out. It’s a Windows issue, not an Alienware issue. It’s easy to enable HDR every time I launch a game and disable it afterward with the Windows + Alt + B keyboard shortcut, but unfortunately triggers HDR for all connected displays. This includes my IPS monitor that imbues everything with a terrible gray hue when HDR is on. So, using the system settings is the best way to adjust HDR for just the QD-OLED.
I landed on this QD-OLED after having spent a ton of time researching pricier models. The unanimous takeaway from reviewers was that LG’s Tandem RGB WOLED panels are some of the brightest out there, but also tend to exhibit lousy gray uniformity in dark scenes. QD-OLED monitors, on the other hand, offer slightly better contrast than WOLED and don’t suffer from those same uniformity issues. However, blacks sometimes appear as dark purple in bright rooms on QD-OLED panels, meaning they’re ideal for rooms that don’t have a bunch of light bouncing around.
There’s no perfect choice, and honestly I got tired of doing research, so I jumped in with the cheapest OLED. I’m glad that I did. Shopping for an OLED gaming monitor can be hard, but it can also be this easy. AOC makes a model that’s discounted to $339.99 at the time of publishing, and its specs are comparable.
As expected, the AW2726DM isn’t a cutting-edge monitor. Its QD-OLED panel isn’t as fast or as bright as some other pricier options, and it doesn’t have USB ports for connecting accessories. Considering its low price, it’s easy for me to overlook those omissions. I’d have a much harder time accepting them in a pricier display.
The fact that I mostly use my computer for text-based work at The Verge is what prevented me from upgrading to an OLED monitor. My 1440p IPS monitor is bright, it’s good at showing text clearly, and it has a fast refresh rate for gaming. Alienware’s QD-OLED is less bright, and some might be bothered by how text looks (I have to really squint to see the slight fringing from this QD-OLED’s subpixel layout). But I have a life outside of work, which includes playing a lot of PC games. That’s the slice of myself I bought this monitor for, and I’m so happy I did.
Photography by Cameron Faulkner / The Verge
Technology
Michael and Susan Dell surpass $1 billion in donations backing AI-driven hospital project
NEWYou can now listen to Fox News articles!
Billionaire Michael Dell and his wife, Susan Dell, have become the first donors to give more than $1 billion to the University of Texas at Austin, funding a massive new medical research campus and hospital system powered by artificial intelligence.
The couple’s latest investment includes a $750 million gift to help build the UT Dell Medical Center, a planned “AI-native” hospital expected to open in 2030 as part of a more than 300-acre advanced research campus.
University officials said the project will integrate research, clinical care and advanced computing to improve early disease detection, personalize treatment and expand access to care in the rapidly growing Austin region.
The Dells’ support builds on decades of contributions to UT, including funding for its medical school, scholarships and research programs.
EXCLUSIVE: REPUBLICANS IN KEY RED STATE LAUNCH CAMPAIGN TO ELECT ‘TRUE’ CONSERVATIVES AHEAD OF TRUMP RETURN
Michael Dell and Susan Dell attend the Breakthrough Prize ceremony as they become the first to donate more than $1 billion to the University of Texas at Austin. ( Craig T Fruchtman/WireImage)
“By bringing together medicine, science and computing in one campus designed for the AI era, UT can create more opportunity, deliver better outcomes, and build a stronger future for communities across Texas and beyond,” Michael Dell and Susan Dell said.
The gift ranks among the largest in the history of higher education, alongside major contributions like Phil Knight’s $2 billion pledge to Oregon Health & Science University and Michael Bloomberg’s $1.8 billion donation to Johns Hopkins University.
The new UT Dell Medical Center will be developed in collaboration with MD Anderson Cancer Center, integrating cancer care into a system designed to connect prevention, diagnosis and treatment.
AI IS RUNNING THE CLASSROOM AT THIS TEXAS SCHOOL, AND STUDENTS SAY ‘IT’S AWESOME’
The University of Texas at Austin campus at sunset. (iStock)
“We will deliver better outcomes for patients by providing research-driven cancer care that is precise, compassionate and hope-filled,” Peter WT Pisters, president of UT MD Anderson, said.
Officials said the facility will be built from the ground up to incorporate AI, rather than retrofitting older infrastructure — an approach they say could transform how hospitals operate.
Independent experts have cautioned that AI in health care can introduce risks if not carefully validated. A widely cited study published in the journal Science by researchers at the University of California, Berkeley and the University of Chicago found that a commonly used healthcare algorithm underestimated the needs of Black patients due to biased training data, highlighting broader concerns about equity in AI-driven systems.
The project also includes funding for undergraduate scholarships, student housing and the Texas Advanced Computing Center, where officials are developing one of the nation’s most powerful academic supercomputers.
TURNING POINT USA BACKS TRUMP ACCOUNTS PROGRAM WITH ‘DOLLAR-FOR-DOLLAR MATCH’ FOR ELIGIBLE EMPLOYEE NEWBORNS
Artificial intelligence technology is expected to play a key role in diagnosis and patient care at the planned UT Dell Medical Center. (iStock)
Texas Gov. Greg Abbott said the investment will help position the state as a national leader in healthcare innovation.
“Texas already dominates in technology, energy and business, and now we will further cement our leadership in health care innovation as well,” Abbott said.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
The university said it plans to break ground on the medical center later this year and has launched a broader campaign to raise $10 billion over the next decade.
The Associated Press contributed to this report.
Technology
SpaceX cuts a deal to maybe buy Cursor for $60 billion
SpaceX and Cursor are now working closely together to create the world’s best coding and knowledge work AI.
The combination of Cursor’s leading product and distribution to expert software engineers with SpaceX’s million H100 equivalent Colossus training supercomputer will allow us to build the world’s most useful models.
Cursor has also given SpaceX the right to acquire Cursor later this year for $60 billion or pay $10 billion for our work together.
-
Science1 minute ago44% of Americans breathe dangerously polluted air. In California, it’s 82%
-
Sports7 minutes agoKings’ close playoff losses to Avalanche stoke confidence and frustration
-
World19 minutes ago‘Blockade and threats’: Iran blames US siege of ports for stalled talks
-
News49 minutes agoPentagon says Navy secretary is leaving, the latest departure of a top defense leader
-
New York2 hours agoGunman Who Killed Baby in Brooklyn Was Targeting Her Father, Police Say
-
Detroit, MI3 hours ago
How these Detroit farmers are fighting for neighborhood food security
-
San Francisco, CA3 hours agoS.F. hospital stabbing analysis confirms Mission Local reporting on security lapses
-
Dallas, TX3 hours agoIt’s a big week for restaurant openings and closings in Dallas