New Phishing Technique Bypasses FIDO MFA, Endangers Security

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 
July 19, 2025 3 min read

Phishing Techniques and FIDO Security

FIDO Downgrade Attack

Recent findings indicate that phishers are employing a new technique to downgrade FIDO multifactor authentication (MFA) rather than bypassing it entirely. This technique is attributed to a group known as PoisonSeed, which has been reported to use phishing emails to lure users to fake login pages, specifically targeting services like Okta.

FIDO Attack
Image courtesy of Risky Business Media

The process begins when a user enters their credentials on a fraudulent site, and the attackers simultaneously log into the real service using the same credentials. Upon this successful entry, the phishing site initiates a cross-device sign-in, capturing a QR code displayed by the legitimate service. When the victim scans this QR code using their mobile device, they inadvertently grant the attackers access to their accounts.

The attack hinges on the design of authentication flows in online services, exploiting weaknesses rather than flaws in the FIDO protocol itself. According to security analysts, the attack can be classified as a downgrade rather than a bypass, emphasizing the importance of strictly adhering to FIDO security specifications to mitigate such risks. Gopher Security's AI-Powered Zero Trust Platform can help organizations strengthen their authentication processes by ensuring compliance with best practices in MFA.

For more detailed analysis, see Phishers have found a way to downgrade—not bypass—FIDO MFA and Risky Bulletin: New phishing technique bypasses FIDO keys.

Device Code Flow Phishing

The Device Code Flow technique poses significant risks to FIDO implementations. This method allows attackers to leverage the OAuth 2.0 Device Authorization Grant to initiate phishing attacks that are difficult to detect. When a user interacts with the original authentication page, the phishing process is executed in the background, making it nearly impossible for the victim to realize they are being attacked.

The streamlined process involves a headless browser that automates the generation of a device code and enters it on the legitimate site without any input from the user. This effectively bypasses the 10-minute token validity limitation and leverages the user's active session, further complicating detection efforts.

For a deeper understanding, refer to Phishing despite FIDO, leveraging a novel technique based on the Device Code Flow.

Mitigation Strategies for FIDO Security

To combat these advanced phishing techniques, organizations must adopt robust policies and technologies. Implementing Gopher Security's Universal Lockdown Controls can help ensure that only authorized users can access sensitive systems, while the Advanced AI Authentication Engine enhances the verification process by analyzing user behavior and context.

The integration of Post Quantum Cryptography in Gopher Security's architecture ensures resilience against future threats, protecting against potential attacks that might exploit quantum computing advancements.

Security analysts should remain vigilant and consider disabling Device Code Flow where feasible. Continuous monitoring through tools like the AI Inspection Engine for Traffic Monitoring can detect anomalies that may indicate a phishing attempt, reinforcing overall security posture.

For additional insights, see How To Bypass Multifactor Authentication and explore Gopher Security’s offerings at Gopher Security.

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 

MBA-credentialed cybersecurity expert specializing in Post-Quantum Cybersecurity solutions with proven capability to reduce attack surfaces by 90%.

Related Articles

Ransomware Attacks Target Russian Vodka and Healthcare Sectors

The Novabev Group, parent company of the Beluga vodka brand, experienced a ransomware attack on July 14, 2025, causing significant disruptions. The attack affected WineLab, the company's liquor store chain, leading to a three-day closure of over 2,000 locations in Russia. The company reported that the attack crippled its IT infrastructure, particularly point-of-sale systems and online services. Novabev Group stated, "The company maintains a principled position of rejecting any interaction with cybercriminals and refuses to fulfill their demands."

By Alan V Gutnov July 19, 2025 3 min read
Read full article

Retail Sector Faces Surge in Ransomware Attacks: A 2025 Analysis

Publicly disclosed ransomware attacks on the retail sector globally surged by 58% in Q2 2025 compared to Q1, with UK-based firms being particularly targeted, according to a report by BlackFog. This spike in attacks follows high-profile breaches affecting retailers like Marks & Spencer (M&S), The Co-op, and Harrods, attributed to the threat actor known as Scattered Spider.

By Alan V Gutnov July 19, 2025 2 min read
Read full article

AI-Driven Lcryx Ransomware Emerges in Cryptomining Botnet

A cryptomining botnet active since 2019 has incorporated a likely AI-generated ransomware known as Lcryx into its operations. Recent analysis by the FortiCNAPP team at FortiGuard Labs identified the first documented incident linking H2miner and Lcryx ransomware. This investigation focused on a cluster of virtual private servers (VPS) utilized for mining Monero.

By Edward Zhou July 19, 2025 3 min read
Read full article

Preventing ClickFix Attacks: Safeguarding Against Human Error

ClickFix is an emerging social engineering technique utilized by threat actors to exploit human error. This technique involves misleading users into executing malicious commands under the guise of providing "quick fixes" for common computer issues. Threat actors use familiar platforms and deceptive prompts to encourage victims to paste and run harmful scripts.

By Alan V Gutnov July 19, 2025 3 min read
Read full article