Rockstar 2FA: Compromising Microsoft 365 Accounts-What MSPs and Small Businesses Need to Know

A digital illustration shows a Guardz Threat Report with a green shield icon. The background features binary code and a fluctuating line graph, symbolizing cybersecurity and data analysis for SMBs and MSPs, including insights into Chrome vulnerability defenses.

Key Takeaways

  1. Sophisticated Phishing-as-a-Service Model: Rockstar 2FA uses advanced adversary-in-the-middle (AiTM) techniques to bypass multi-factor authentication (MFA) protections in Microsoft 365.
  2. Small Businesses Are Prime Targets: Limited resources and cybersecurity awareness make small and medium-sized businesses especially vulnerable to such attacks.
  3. MSPs Must Evolve Defense Strategies: The role of Managed Service Providers (MSPs) in combating advanced threats is more critical than ever, requiring proactive tools, training, and incident response.

The Threat Landscape: What Is Rockstar 2FA?

A recent discovery has exposed a new iteration of Phishing-as-a-Service (PhaaS) platforms called Rockstar 2FA. This campaign focuses on stealing credentials from Microsoft 365 (M365) by bypassing MFA protections through adversary-in-the-middle (AiTM) techniques. The platform is a subscription-based service marketed to cybercriminals across forums like Telegram and Mail.ru, offering advanced features such as:

  • Session cookie harvesting to hijack active user sessions
  • Customizable phishing templates mimicking trusted services
  • Antibot features to avoid automated detection systems
  • Randomized source code and links to evade detection and FUD attachments 

Rockstar 2FA capitalizes on user trust in services like Microsoft 365, posing a significant risk for organizations that rely on this platform for communication and collaboration. Its accessibility to attackers, regardless of technical expertise, makes it a widespread and pressing concern.

For more technical details, see the analysis by Trustwave: Rockstar 2FA PhaaS Campaign.


How the Attack Works

At the heart of the Rockstar 2FA campaign is its adversary-in-the-middle (AiTM) technique. Here’s how the attack unfolds:

  1. Phishing Email: The Attacker is sending an email using the templates of the Rockstar platform, such as: Document and file-sharing notifications, MFA lures, E-signature platform-themed messages and more. The campaign executed through several email delivery mechanisms, like compromised accounts, to conceal oneself behind a credible source and contain FUD links and attachments to bypass antispam detections.
  2. Antibot: Upon being redirected to the landing page, the user will encounter a Cloudflare Turnstile challenge – a free service that protects websites from bots. Threat actors now exploit to avoid automated analysis of their phishing pages.
  3. The AiTM Server: The server functions as both the phishing landing page, the credentials housing server and the proxy server. The phishing page mimics the brand’s sign-in page despite obfuscated HTML, forwarding those credentials to the legitimate service to complete the authentication process and then sending user data directly to the AiTM server to extract credentials and retrieve the target account’s session cookie.
  4. Credential and Cookie Theft: When the victim enters their login credentials and MFA code, the proxy server captures both, along with session cookies.
  5. Session Hijacking: Using these session cookies, attackers can access the victim’s account without needing to allow MFA repeatedly.

This approach is particularly effective because it nullifies MFA protections, which are traditionally seen as a critical safeguard against unauthorized access.

The Impact on Small Businesses Using Microsoft 365

Small businesses are a favorite target for phishing campaigns due to limited cybersecurity resources and expertise. For organizations heavily reliant on M365 for day-to-day operations, the risks include:

  • Data Breaches: Unauthorized access to sensitive files, emails, and client information stored in M365.
  • Business Disruption: Compromised accounts can lead to halted operations, delayed projects, or worse, ransomware incidents.
  • Business Email Compromise (BEC) is a sophisticated type of phishing attack where cybercriminals impersonate trusted executives, employees, or business partners to deceive victims into transferring funds or sharing sensitive information. BEC often involves carefully crafted emails that exploit human trust, bypassing technical defenses and resulting in significant financial and reputational damage for organizations.
  • Financial Loss: Whether through direct theft, fraudulent transactions, or fines related to non-compliance with data protection regulations.

The Rockstar 2FA campaign also leverages trusted platforms like Atlassian Confluence, Google Docs, Microsoft OneDrive and OneNote- to host malicious links, making phishing emails harder to identify.


The Critical Role of MSPs in Defending Against Rockstar 2FA and Similar Threats

Managed Service Providers (MSPs) have become indispensable for small and medium-sized enterprises (SMEs) navigating today’s complex cybersecurity landscape. As Rockstar 2FA highlights, phishing campaigns are becoming more advanced, leveraging tools and tactics that were once the domain of highly skilled hackers. In this context, MSPs play a multifaceted role, acting not just as service providers but as strategic partners in securing their clients’ operations.


1. Proactive Threat Prevention

MSPs must focus on preventing threats before they reach their clients’ environments. This requires a blend of technical expertise, advanced tools, and constant vigilance.

  • Deploying Phishing Simulations:
    MSPs can implement solutions like Guardz’s AI-powered phishing simulations to proactively test their clients’ susceptibility to phishing attempts. These simulations mirror real-world scenarios, helping organizations identify gaps in employee training and response.
    • Example: Regular phishing drills can reveal if employees are consistently clicking on malicious links, allowing MSPs to intervene with targeted education.
  • Security Configuration Management:
    Ensuring that Microsoft 365 environments are configured with best-practice security settings (e.g., disabling legacy authentication, enabling conditional access policies) reduces the attack surface significantly.

2. Real-Time Detection and Response

Phishing campaigns like Rockstar 2FA are designed to bypass traditional security mechanisms, making real-time detection critical.

  • Anomaly Monitoring:
    MSPs should deploy tools that track login anomalies, such as sign-ins from unexpected locations or devices. Suspicious behavior can trigger alerts and automatic account lockdowns.
  • Continuous Security Operations:
    Many MSPs now operate Security Operations Centers (SOCs) or leverage third-party providers to monitor client environments around the clock. For example, unusual activity within Microsoft 365—like mass file downloads—can indicate a compromised account and prompt immediate action.
  • Incident Response Planning:
    When phishing attacks succeed, MSPs must act quickly to mitigate damage. An effective incident response plan includes:
    • Revoking compromised session cookies and resetting credentials.
    • Performing forensic analysis to understand how the breach occurred.
    • Communicating transparently with the client about the incident and steps for recovery.

3. Employee Education and Cyber Hygiene

Phishing remains one of the most successful attack vectors because it targets human behavior. MSPs can turn this vulnerability into a strength by fostering a culture of cybersecurity awareness.

  • Tailored Cybersecurity Training:
    MSPs should regularly provide training sessions for employees, focusing on real-world examples of phishing attempts. These sessions should cover:
    • Identifying phishing red flags, such as mismatched URLs, urgent language, and unusual requests.
    • Steps to verify sender legitimacy, such as calling the organization directly.
    • The importance of not sharing credentials or MFA codes under any circumstances.
  • Phishing Resilience Programs:
    A resilience program combines simulated phishing attacks, immediate feedback, and ongoing education. The goal is to transform employees from potential vulnerabilities into a critical line of defense.

4. Security Integration Across Platforms

Small businesses often rely on multiple cloud-based platforms beyond Microsoft 365, such as Google Workspace, Dropbox, and CRM systems. MSPs must ensure that security measures extend seamlessly across these platforms.

  • Unified Threat Management:
    By integrating security tools across platforms, MSPs can create a centralized system for threat detection and response. This approach prevents attackers from exploiting gaps in security coverage.
  • Identity and Access Management (IAM):
    Implementing IAM solutions ensures that access to sensitive data is restricted to authorized personnel. MSPs should use tools that enforce principles like least privilege and role-based access controls.

5. Guiding Clients Through a Changing Threat Landscape

Cyber threats evolve rapidly, and businesses often struggle to keep up. MSPs act as trusted advisors, helping their clients navigate these changes.

  • Regular Security Reviews:
    Periodic reviews allow MSPs to assess their clients’ current security posture and recommend updates to address new threats, such as those posed by Rockstar 2FA.
  • Advising on Cybersecurity Investments:
    MSPs can guide businesses on the most effective use of limited budgets, prioritizing solutions that deliver the highest return on investment. For instance:
    • Encouraging investment in tools like phishing simulations to prevent human errors.
    • Recommending endpoint detection and response (EDR) solutions to protect against ransomware.
  • Cyber Insurance Advisory:
    With threats like Rockstar 2FA on the rise, MSPs can assist clients in obtaining cyber insurance policies that cover phishing-related damages, complementing their technical defenses.

6. Building Trust Through Transparency

For many small businesses, trust is a key factor in selecting an MSP. Clients need to feel confident that their MSP is not only capable of defending against threats but also committed to their success.

  • Regular Reporting:
    Providing clients with detailed reports on security incidents, training outcomes, and system health builds confidence and highlights the value of the MSP’s services.
  • Collaborative Incident Management:
    When a breach occurs, clear and honest communication ensures clients understand the steps being taken to resolve the issue and prevent future occurrences.

Guardz’s Comprehensive Approach to Phishing Prevention

Guardz offers a robust suite of tools designed to combat phishing threats and enhance organizational resilience, making it an invaluable ally for MSPs and small businesses. By combining email security protection and AI-powered phishing simulations, Guardz provides both proactive and reactive defenses against campaigns like Rockstar 2FA.


1. Email Security Protection

Guardz’s email security solution is a critical first line of defense against phishing attacks. It actively scans and monitors incoming emails, detecting and blocking suspicious messages before they reach employees’ inboxes.

Key capabilities include:

  • Phishing Detection: Identifies malicious links, attachments, and spoofed sender addresses commonly used in phishing campaigns.
  • Real-Time Threat Analysis: Uses advanced algorithms to analyze email metadata and content for indicators of compromise (IoCs).
  • Automated Remediation: Flags and quarantines phishing emails, preventing users from interacting with potentially harmful content.

This layer of protection significantly reduces the likelihood of a phishing attack reaching employees, especially in environments with high email traffic like Microsoft 365.


2. Phishing Simulation Tool

Even with robust email protection, phishing attempts may occasionally bypass filters, relying on human error to succeed. Guardz addresses this vulnerability with its AI-powered phishing simulation tool, designed to enhance employee awareness and resilience.

How it Works:

  • Realistic Simulations: Guardz leverages AI to craft realistic phishing campaigns that mimic current threats, including tactics like AiTM attacks.
  • Customizable Scenarios: MSPs can tailor simulations to align with the specific challenges faced by their clients, making the training highly relevant.
  • Immediate Feedback: Employees receive instant feedback on their actions during simulations, turning mistakes into valuable learning opportunities.
  • Actionable Reporting: Detailed reports help organizations identify patterns in employee behavior and target areas for improvement.

By regularly running simulations, businesses can build a culture of vigilance, ensuring employees are prepared to recognize and report phishing attempts in real-world scenarios.


Lessons Learned: Protecting Against Sophisticated Phishing Attacks

For MSPs:

  1. Stay Ahead of Threats: Regularly update clients about evolving phishing tactics like AiTM attacks to ensure they understand the risks.
  2. Adopt Layered Security: Combine phishing simulations, endpoint protection, and continuous monitoring for a robust defense.
  3. Empower Through Education: Provide ongoing training and resources to help employees identify and report phishing attempts effectively.

For Small Businesses:

  1. Trust but Verify: Always verify suspicious emails, especially those requesting credentials or sensitive information.
  2. Invest in Training: Regular phishing simulations can help employees stay alert and minimize errors.
  3. Rely on Experts: Partnering with a knowledgeable MSP ensures access to advanced tools and expertise that may not be available in-house.

The Rockstar 2FA campaign highlights the growing sophistication of phishing attacks and the urgent need for advanced defenses. For MSPs and small businesses, proactive strategies, continuous education, and robust tools like Guardz’s phishing simulations are critical in staying secure.

Categories:

Tal Eisner is the Vice President of Product Marketing at Guardz, bringing over two decades of experience in cybersecurity and fraud management. Prior to joining Guardz, Tal led marketing efforts at Check Point Research, the Intelligence & Research division of a leading cybersecurity company. With a strong background in security, Tal combines his technical expertise with a strategic focus on marketing, communications, and business development. His career reflects a deep commitment to advancing cybersecurity solutions while effectively communicating their value to diverse audiences.

Subscribe to
Our Newsletter.

Continue Reading

A graphic depicts a masked figure stealing a large envelope from a laptop screen with Warning! displayed. Surrounding the laptop are symbols of a padlock, exclamation mark, and warning triangles, highlighting BEC attacks. This vivid image serves as a reminder to prevent BEC threats effectively.

Inbox Overload: How to Prevent BEC Attacks

Profile images of Tal Eisner and Bob Burg on a purple background. Tal is noted as VP of Product Marketing at Guardz, where MSP Success is prioritized. Bob is recognized as Co-Founder of The Go-Giver Success Vault and a Hall of Fame Keynote Speaker who champions the Go-Giver Approach. A digital lock graphic is on the right.

The Go-Giver Approach to MSP Success: Unlocking Growth Through Value, Trust, and Authenticity

Illustration with abstract shapes in blue, green, and purple. Center text: NEW TREND 2025 with a lightbulb icon. Circular text repeating Top Trends on the right. Background features rounded, gradient shapes hinting at MSP innovations for the future.

Top 6 Trends Every MSP Must Know About for 2025

A person sits in a futuristic control room, resembling an archive, with large screens displaying stars and planets, suggesting space. The background features abstract mountain outlines under a pale sky with a moon.

Guardz, Cybersecurity
Co-Pilot for MSPs

Demonstrate the value you bring to the table as an MSP and gain visibility into your clients’ external postures.
Holistic Protection.
Hassle-Free.
Cost-Effective.

Guide to Boosting Your Email Security

Discover the Power of Cybersecurity for Your MSP Growth.

Dive into the crucial e-mail security protocols (SPF, DKIM, DMARC) to enhance your e-mail protection and make sure your e-mails are delivered in the inbox of your recipients instead of the spam or quarantine folder.

This guide provides you with innovative strategies and expert insights to elevate your MSP business, strengthen client trust, and stay ahead of ever-evolving threats.

A silhouetted astronaut figure stands in an open door frame, like an exit popup against the cosmos, facing a starry sky with a distant planet in view, contrasting with a plain, stark interior.
Graphic showing several yellow envelopes with letters, one red envelope marked by a red exclamation triangle, on a purple background with circuit lines. Green shield icons are on some envelopes, indicating security against cyber risks.

Guide to Boosting Your Email Security

Discover the Power of Cybersecurity for Your MSP Growth.

Dive into the crucial e-mail security protocols (SPF, DKIM, DMARC) to enhance your e-mail protection and make sure your e-mails are delivered in the inbox of your recipients instead of the spam or quarantine folder.

This guide provides you with innovative strategies and expert insights to elevate your MSP business, strengthen client trust, and stay ahead of ever-evolving threats.

Illustration of yellow envelopes with documents against a purple backdrop. Red warning icons with exclamation marks suggest potential cyber risks. Circuit-like lines enhance the background, reminiscent of a Cyber Risk Prospecting Report alert.
Illustration of yellow envelopes on a purple background, with two red envelopes marked by exclamation points, indicating cyber risk warnings. Green shield icons adorn some envelopes, while a radar-like pattern enhances the sense of alertness in the background.