Key Takeaways
- Sophisticated Phishing-as-a-Service Model: Rockstar 2FA uses advanced adversary-in-the-middle (AiTM) techniques to bypass multi-factor authentication (MFA) protections in Microsoft 365.
- Small Businesses Are Prime Targets: Limited resources and cybersecurity awareness make small and medium-sized businesses especially vulnerable to such attacks.
- MSPs Must Evolve Defense Strategies: The role of Managed Service Providers (MSPs) in combating advanced threats is more critical than ever, requiring proactive tools, training, and incident response.
The Threat Landscape: What Is Rockstar 2FA?
A recent discovery has exposed a new iteration of Phishing-as-a-Service (PhaaS) platforms called Rockstar 2FA. This campaign focuses on stealing credentials from Microsoft 365 (M365) by bypassing MFA protections through adversary-in-the-middle (AiTM) techniques. The platform is a subscription-based service marketed to cybercriminals across forums like Telegram and Mail.ru, offering advanced features such as:
- Session cookie harvesting to hijack active user sessions
- Customizable phishing templates mimicking trusted services
- Antibot features to avoid automated detection systems
- Randomized source code and links to evade detection and FUD attachments
Rockstar 2FA capitalizes on user trust in services like Microsoft 365, posing a significant risk for organizations that rely on this platform for communication and collaboration. Its accessibility to attackers, regardless of technical expertise, makes it a widespread and pressing concern.
For more technical details, see the analysis by Trustwave: Rockstar 2FA PhaaS Campaign.
How the Attack Works
At the heart of the Rockstar 2FA campaign is its adversary-in-the-middle (AiTM) technique. Here’s how the attack unfolds:
- Phishing Email: The Attacker is sending an email using the templates of the Rockstar platform, such as: Document and file-sharing notifications, MFA lures, E-signature platform-themed messages and more. The campaign executed through several email delivery mechanisms, like compromised accounts, to conceal oneself behind a credible source and contain FUD links and attachments to bypass antispam detections.
- Antibot: Upon being redirected to the landing page, the user will encounter a Cloudflare Turnstile challenge – a free service that protects websites from bots. Threat actors now exploit to avoid automated analysis of their phishing pages.
- The AiTM Server: The server functions as both the phishing landing page, the credentials housing server and the proxy server. The phishing page mimics the brand’s sign-in page despite obfuscated HTML, forwarding those credentials to the legitimate service to complete the authentication process and then sending user data directly to the AiTM server to extract credentials and retrieve the target account’s session cookie.
- Credential and Cookie Theft: When the victim enters their login credentials and MFA code, the proxy server captures both, along with session cookies.
- Session Hijacking: Using these session cookies, attackers can access the victim’s account without needing to allow MFA repeatedly.
This approach is particularly effective because it nullifies MFA protections, which are traditionally seen as a critical safeguard against unauthorized access.
The Impact on Small Businesses Using Microsoft 365
Small businesses are a favorite target for phishing campaigns due to limited cybersecurity resources and expertise. For organizations heavily reliant on M365 for day-to-day operations, the risks include:
- Data Breaches: Unauthorized access to sensitive files, emails, and client information stored in M365.
- Business Disruption: Compromised accounts can lead to halted operations, delayed projects, or worse, ransomware incidents.
- Business Email Compromise (BEC) is a sophisticated type of phishing attack where cybercriminals impersonate trusted executives, employees, or business partners to deceive victims into transferring funds or sharing sensitive information. BEC often involves carefully crafted emails that exploit human trust, bypassing technical defenses and resulting in significant financial and reputational damage for organizations.
- Financial Loss: Whether through direct theft, fraudulent transactions, or fines related to non-compliance with data protection regulations.
The Rockstar 2FA campaign also leverages trusted platforms like Atlassian Confluence, Google Docs, Microsoft OneDrive and OneNote- to host malicious links, making phishing emails harder to identify.
The Critical Role of MSPs in Defending Against Rockstar 2FA and Similar Threats
Managed Service Providers (MSPs) have become indispensable for small and medium-sized enterprises (SMEs) navigating today’s complex cybersecurity landscape. As Rockstar 2FA highlights, phishing campaigns are becoming more advanced, leveraging tools and tactics that were once the domain of highly skilled hackers. In this context, MSPs play a multifaceted role, acting not just as service providers but as strategic partners in securing their clients’ operations.
1. Proactive Threat Prevention
MSPs must focus on preventing threats before they reach their clients’ environments. This requires a blend of technical expertise, advanced tools, and constant vigilance.
- Deploying Phishing Simulations:
MSPs can implement solutions like Guardz’s AI-powered phishing simulations to proactively test their clients’ susceptibility to phishing attempts. These simulations mirror real-world scenarios, helping organizations identify gaps in employee training and response.- Example: Regular phishing drills can reveal if employees are consistently clicking on malicious links, allowing MSPs to intervene with targeted education.
- Security Configuration Management:
Ensuring that Microsoft 365 environments are configured with best-practice security settings (e.g., disabling legacy authentication, enabling conditional access policies) reduces the attack surface significantly.
2. Real-Time Detection and Response
Phishing campaigns like Rockstar 2FA are designed to bypass traditional security mechanisms, making real-time detection critical.
- Anomaly Monitoring:
MSPs should deploy tools that track login anomalies, such as sign-ins from unexpected locations or devices. Suspicious behavior can trigger alerts and automatic account lockdowns. - Continuous Security Operations:
Many MSPs now operate Security Operations Centers (SOCs) or leverage third-party providers to monitor client environments around the clock. For example, unusual activity within Microsoft 365—like mass file downloads—can indicate a compromised account and prompt immediate action. - Incident Response Planning:
When phishing attacks succeed, MSPs must act quickly to mitigate damage. An effective incident response plan includes:- Revoking compromised session cookies and resetting credentials.
- Performing forensic analysis to understand how the breach occurred.
- Communicating transparently with the client about the incident and steps for recovery.
3. Employee Education and Cyber Hygiene
Phishing remains one of the most successful attack vectors because it targets human behavior. MSPs can turn this vulnerability into a strength by fostering a culture of cybersecurity awareness.
- Tailored Cybersecurity Training:
MSPs should regularly provide training sessions for employees, focusing on real-world examples of phishing attempts. These sessions should cover:- Identifying phishing red flags, such as mismatched URLs, urgent language, and unusual requests.
- Steps to verify sender legitimacy, such as calling the organization directly.
- The importance of not sharing credentials or MFA codes under any circumstances.
- Phishing Resilience Programs:
A resilience program combines simulated phishing attacks, immediate feedback, and ongoing education. The goal is to transform employees from potential vulnerabilities into a critical line of defense.
4. Security Integration Across Platforms
Small businesses often rely on multiple cloud-based platforms beyond Microsoft 365, such as Google Workspace, Dropbox, and CRM systems. MSPs must ensure that security measures extend seamlessly across these platforms.
- Unified Threat Management:
By integrating security tools across platforms, MSPs can create a centralized system for threat detection and response. This approach prevents attackers from exploiting gaps in security coverage. - Identity and Access Management (IAM):
Implementing IAM solutions ensures that access to sensitive data is restricted to authorized personnel. MSPs should use tools that enforce principles like least privilege and role-based access controls.
5. Guiding Clients Through a Changing Threat Landscape
Cyber threats evolve rapidly, and businesses often struggle to keep up. MSPs act as trusted advisors, helping their clients navigate these changes.
- Regular Security Reviews:
Periodic reviews allow MSPs to assess their clients’ current security posture and recommend updates to address new threats, such as those posed by Rockstar 2FA. - Advising on Cybersecurity Investments:
MSPs can guide businesses on the most effective use of limited budgets, prioritizing solutions that deliver the highest return on investment. For instance:- Encouraging investment in tools like phishing simulations to prevent human errors.
- Recommending endpoint detection and response (EDR) solutions to protect against ransomware.
- Cyber Insurance Advisory:
With threats like Rockstar 2FA on the rise, MSPs can assist clients in obtaining cyber insurance policies that cover phishing-related damages, complementing their technical defenses.
6. Building Trust Through Transparency
For many small businesses, trust is a key factor in selecting an MSP. Clients need to feel confident that their MSP is not only capable of defending against threats but also committed to their success.
- Regular Reporting:
Providing clients with detailed reports on security incidents, training outcomes, and system health builds confidence and highlights the value of the MSP’s services. - Collaborative Incident Management:
When a breach occurs, clear and honest communication ensures clients understand the steps being taken to resolve the issue and prevent future occurrences.
Guardz’s Comprehensive Approach to Phishing Prevention
Guardz offers a robust suite of tools designed to combat phishing threats and enhance organizational resilience, making it an invaluable ally for MSPs and small businesses. By combining email security protection and AI-powered phishing simulations, Guardz provides both proactive and reactive defenses against campaigns like Rockstar 2FA.
1. Email Security Protection
Guardz’s email security solution is a critical first line of defense against phishing attacks. It actively scans and monitors incoming emails, detecting and blocking suspicious messages before they reach employees’ inboxes.
Key capabilities include:
- Phishing Detection: Identifies malicious links, attachments, and spoofed sender addresses commonly used in phishing campaigns.
- Real-Time Threat Analysis: Uses advanced algorithms to analyze email metadata and content for indicators of compromise (IoCs).
- Automated Remediation: Flags and quarantines phishing emails, preventing users from interacting with potentially harmful content.
This layer of protection significantly reduces the likelihood of a phishing attack reaching employees, especially in environments with high email traffic like Microsoft 365.
2. Phishing Simulation Tool
Even with robust email protection, phishing attempts may occasionally bypass filters, relying on human error to succeed. Guardz addresses this vulnerability with its AI-powered phishing simulation tool, designed to enhance employee awareness and resilience.
How it Works:
- Realistic Simulations: Guardz leverages AI to craft realistic phishing campaigns that mimic current threats, including tactics like AiTM attacks.
- Customizable Scenarios: MSPs can tailor simulations to align with the specific challenges faced by their clients, making the training highly relevant.
- Immediate Feedback: Employees receive instant feedback on their actions during simulations, turning mistakes into valuable learning opportunities.
- Actionable Reporting: Detailed reports help organizations identify patterns in employee behavior and target areas for improvement.
By regularly running simulations, businesses can build a culture of vigilance, ensuring employees are prepared to recognize and report phishing attempts in real-world scenarios.
Lessons Learned: Protecting Against Sophisticated Phishing Attacks
For MSPs:
- Stay Ahead of Threats: Regularly update clients about evolving phishing tactics like AiTM attacks to ensure they understand the risks.
- Adopt Layered Security: Combine phishing simulations, endpoint protection, and continuous monitoring for a robust defense.
- Empower Through Education: Provide ongoing training and resources to help employees identify and report phishing attempts effectively.
For Small Businesses:
- Trust but Verify: Always verify suspicious emails, especially those requesting credentials or sensitive information.
- Invest in Training: Regular phishing simulations can help employees stay alert and minimize errors.
- Rely on Experts: Partnering with a knowledgeable MSP ensures access to advanced tools and expertise that may not be available in-house.
The Rockstar 2FA campaign highlights the growing sophistication of phishing attacks and the urgent need for advanced defenses. For MSPs and small businesses, proactive strategies, continuous education, and robust tools like Guardz’s phishing simulations are critical in staying secure.
- Share On:
Written by
Tal Eisner is the Vice President of Product Marketing at Guardz, bringing over two decades of experience in cybersecurity and fraud management. Prior to joining Guardz, Tal led marketing efforts at Check Point Research, the Intelligence & Research division of a leading cybersecurity company. With a strong background in security, Tal combines his technical expertise with a strategic focus on marketing, communications, and business development. His career reflects a deep commitment to advancing cybersecurity solutions while effectively communicating their value to diverse audiences.