Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

iOS 26 Beta 4 has arrived, with liquid glass adjustments and AI news summary

Microsoft Link Exploits to 3 Chinese Hacker Groups in SharePoint ongoing

Google and Microsoft say Chinese hackers are using SharePoint Zero-Day

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Bypass poison hacker bypass fido key using QR phishing and cross-device sign-in abuse
Identity

Bypass poison hacker bypass fido key using QR phishing and cross-device sign-in abuse

userBy userJuly 21, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 21, 2025Ravi LakshmananThreat Intelligence/Authentication

Cybersecurity researchers have revealed a new attack technique that allows threat actors to bypass key protections of Fast Identity (FIDO) by deceiving users to approve authentication requests from the spoofed company login portal.

A FIDO key is a hardware or software-based authenticator designed to eliminate phishing by combining logins to a specific domain using public-private key encryption. In this case, the attacker will misuse legitimate features (cross-device sign-in) to trick the victim into a malicious session that unconsciously authenticates the victim.

The activity observed by Expel as part of a wild phishing campaign is attributed to a threat actor named Poisonseed. It was recently flagged to send SPAM messages containing cryptocurrency seed phrases and Drain victims, leveraging compromised credentials related to customer relationship management (CRM) tools and bulk email providers.

“Attacks do this by utilizing the cross-device sign-in feature available with a FIDO key,” said researchers Ben Nahorney and Brandon Overstreet. “But the bad actors in this case use this feature in their mid-stream attack (AITM) attacks.”

This technique does not work in all scenarios. In particular, it targets users who authenticate via cross-device flows that do not enforce strict proximity checks, such as Bluetooth or local device proofs. If your environment requires a hardware security key that is directly connected to the login device, or if you use a platform-bound authenticator (such as a Face ID tied to the browser’s context), the attack chain will be corrupted.

Cybersecurity

Cross-device sign-in allows users to sign in to devices that do not have PassKey using a second device, such as a mobile phone, that holds an encryption key.

The attack chain documented by Expel begins with a phishing email inviting recipients to log in to a fake sign-in page that mimics the Enterprise OKTA portal. Once the victim enters their credentials, the sign-in information is secretly relayed to the real login page by the fake site.

The phishing site will instruct legitimate login pages to use hybrid shipping methods for authentication. This will provide the page with a QR code, then sent back to the phishing site and presented to the victim.

If a user scans a QR code on a mobile device using the Authenticator app, the attacker can gain unauthorized access to the victim’s account.

“In this attack, the bad actor entered the correct username and password and asked to sign in on the cross-device,” Expel said.

“The login portal displays a QR code, which is immediately captured by the phishing site and relayed to the user on the fake site. The user is communicating with the MFA authenticator, login portal, and MFA authenticator, and the attacker is taking part.”

What is noteworthy about attacks is that they bypass the protection provided by the FIDO key, allowing threat actors to gain access to the user’s account. The compromise method does not exploit flaws in FIDO implementation. Rather, it abuses legitimate capabilities that downgrade the certification process.

Although FIDO2 is designed to resist phishing, if proximity verification like Bluetooth is not implemented, cross-device login flows known as hybrid transport can be misused. In this flow, users can log in to their desktop by scanning the QR code using a mobile device that holds the passkey.

However, attackers can intercept and relay their QR codes in real time via phishing sites, and suppress them to authorize authentication in domains spoofed to users. This will turn the safe feature into a phishing loophole. There are no defects in the protocol, but for flexible implementation.

Cybersecurity

Expel also said it observed another incident in which threat actors registered their own FIDO key after breaching their accounts via phishing emails and resetting their users’ passwords.

To better protect user accounts, organizations must use FIDO2 authentication to pair with checks to verify which devices are being used. If possible, login should occur on the same device that holds the PassKey. This limits the risk of phishing. Security teams should be aware of unusual QR code logins or new PassKey registrations. Account recovery options require you to use a phishing-resistant method, and the login screen helps users find suspicious activity by displaying helpful details such as location, device type, or clear warnings, especially when signing in with a cross-device.

If anything, the findings highlight the need to adopt phishing-resistant authentication at every step of the account lifecycle, including the recovery stage, as using phishing-prone authentication methods can undermine the entire identity infrastructure.

“AITM attacks are the latest in a long time instance where bad actors and defenders raise ante in the fight to compromise/protect user accounts,” the researchers added.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticlePraise analog cities: promoting the future in times of crisis
Next Article The Growing Challenge of American Orphan Oil Wells
user
  • Website

Related Posts

Microsoft Link Exploits to 3 Chinese Hacker Groups in SharePoint ongoing

July 22, 2025

Cisco checks active exploits targeting defects in ISE and allows for unrecognized root access

July 22, 2025

Allakore, Purerat and Hijack Loader’s stolen qualifications and remote access to grow

July 22, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

iOS 26 Beta 4 has arrived, with liquid glass adjustments and AI news summary

Microsoft Link Exploits to 3 Chinese Hacker Groups in SharePoint ongoing

Google and Microsoft say Chinese hackers are using SharePoint Zero-Day

Cisco checks active exploits targeting defects in ISE and allows for unrecognized root access

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Is ‘Baby Grok’ the Future of Kids’ AI? Elon Musk Launches New Chatbot

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

Building AGI: Zuckerberg Commits Billions to Meta’s Superintelligence Data Center Expansion

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.