How to detect and stop #Salty2FA, a phishing attack that bypasses MFA.

View organization page for ANY.RUN

18,256 followers

👾 #Salty2FA is a #PhaaS hijacking user sessions and stealing Microsoft 365 credentials. It bypasses six MFA types, turning 2FA into an attack vector. ⚠️ Attackers leverage Cloudflare Turnstile, obfuscation, and real-time credential validation to evade detection. Discover how to detect & stop it before it’s too late: https://lnkd.in/ebrwhBUP 👨💻 Use #ANYRUN’s Threat Intelligence Lookup to enrich IOCs with live attack data from threat analyses across 15K SOCs: https://lnkd.in/eR7yPAEu #CybersecurityAwarenessMonth

  • No alternative text description for this image

To view or add a comment, sign in

Explore content categories