Until recently, threat actors haven’t really invested much time in MFA phish kits because not a lot of people used MFA. (Everyone needs MFA, full stop.)
Consequently, threat actors are using more advanced multi-factor authentication-enabled phish kits.
Find out why in our first episode of DISCARDED, where we hear from Tim Kromphardt, Email Threat Researcher at Proofpoint, about why MFA kits are sort of like Justin Bieber ticket thieves.
Join us as we discuss:
How MFA kits differ from ordinary phish kits
What threat actors and researchers have in common
A technical dive into transparent reverse proxies
Why you need multifactor authentication despite the rise of MFA kits
Check out these resources we mentioned during the podcast:
MFA PSA, Oh My!
Catching Transparent Phish: Analyzing and Detecting MITM Phishing Toolkits
Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!