Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

DNS Uncovers Infrastructure Used in SSO Attacks

0
Medium
Published: Wed Dec 03 2025 (12/03/2025, 17:58:34 UTC)
Source: AlienVault OTX General

Description

The threat actor leveraged Evilginx (likely version 3.0), an open source, advanced phishing adversary-in-the-middle (AITM, aka MITM) framework designed to steal login credentials and session cookies. Evilginx is widely used by cybercriminals to undermine multi-factor authentication (MFA) security, and this actor has used it to target at least 18 universities and educational institutions across the United States since April 2025. The campaigns were delivered through email and the phishing domains used subdomains that mimicked the legitimate SSO sites.

AI-Powered Analysis

AILast updated: 12/03/2025, 18:14:15 UTC

Technical Analysis

This threat involves the use of Evilginx version 3.0, an open-source adversary-in-the-middle (AITM) phishing framework that acts as a reverse proxy to intercept and steal login credentials and session cookies from users during Single Sign-On (SSO) authentication processes. Evilginx enables attackers to bypass multi-factor authentication (MFA) by capturing session tokens, effectively allowing them to impersonate legitimate users without needing to compromise MFA directly. The threat actor has conducted targeted phishing campaigns since April 2025, focusing on at least 18 universities and educational institutions in the United States. These campaigns are delivered via email, using phishing domains with subdomains crafted to closely resemble legitimate SSO login pages, increasing the likelihood of user deception. The attacker’s infrastructure was uncovered through DNS analysis, revealing the use of malicious subdomains and domain names designed to evade detection. Although no widespread exploitation beyond these campaigns is currently known, the technique is sophisticated and effective against organizations relying on SSO and MFA for authentication security. The attack leverages techniques categorized under MITRE ATT&CK tactics T1557 (Adversary-in-the-Middle), T1566 (Phishing), and T1539 (Steal Web Session Cookie). The absence of a CVSS score necessitates an assessment based on impact and exploitability, with the medium severity reflecting the threat’s ability to compromise confidentiality and integrity without requiring complex exploitation or extensive user interaction beyond phishing. The threat highlights the importance of securing DNS infrastructure, user awareness, and deploying anti-phishing defenses to protect SSO environments.

Potential Impact

For European organizations, especially those in the education sector or any entity relying heavily on SSO authentication, this threat can lead to significant credential compromise and session hijacking. The attacker’s ability to bypass MFA undermines one of the strongest layers of defense, increasing the risk of unauthorized access to sensitive data, intellectual property, and internal systems. Compromised credentials can facilitate lateral movement within networks, data exfiltration, and potential disruption of services. The reputational damage and regulatory consequences under GDPR for data breaches involving personal data are also considerable. Given the phishing delivery vector, widespread user susceptibility could amplify the impact. The threat is particularly concerning for institutions with large user bases and less mature phishing detection capabilities. Additionally, the use of DNS infrastructure for attack delivery suggests that organizations with insufficient DNS monitoring and filtering may be more vulnerable. The medium severity rating reflects a balance between the sophisticated attack method and the requirement for user interaction (phishing click), meaning that while impactful, the threat is not trivially exploitable at scale without user engagement.

Mitigation Recommendations

1. Implement advanced phishing detection and email filtering solutions that can identify and block emails containing malicious links or domains mimicking legitimate SSO services. 2. Conduct targeted user awareness training focused on recognizing phishing attempts, especially those impersonating SSO login pages. 3. Deploy DNS monitoring and filtering tools to detect and block access to suspicious subdomains and domains used in these campaigns. 4. Enforce strict domain and subdomain registration monitoring to identify potential lookalike domains early. 5. Utilize browser isolation or anti-phishing browser extensions that can detect and warn users about man-in-the-middle proxy attacks. 6. Implement anomaly detection on authentication logs to identify unusual login patterns or session behaviors indicative of session hijacking. 7. Consider adopting hardware-based MFA tokens or FIDO2/WebAuthn standards, which are less susceptible to session cookie theft. 8. Regularly review and update incident response plans to include scenarios involving AITM phishing attacks. 9. Collaborate with DNS providers and threat intelligence services to share indicators of compromise and block malicious infrastructure proactively. 10. Encourage the use of zero-trust network architectures that limit the impact of compromised credentials.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://blogs.infoblox.com/threat-intelligence/dns-uncovers-infrastructure-used-in-sso-attacks/"]
Adversary
null
Pulse Id
69307a4a316b3f36d7ee486e
Threat Score
null

Indicators of Compromise

Ip

ValueDescriptionCopy
ip160.153.178.199
CC=US ASN=AS20773 host europe gmbh
ip162.0.228.151
CC=US ASN=AS22612 namecheap inc.
ip192.169.177.165
CC=US ASN=AS398101 godaddy.com llc
ip132.148.74.178
CC=US ASN=AS398101 godaddy.com llc
ip160.153.176.197
CC=US ASN=AS20773 host europe gmbh
ip162.0.214.254
CC=US ASN=AS22612 namecheap inc.
ip199.192.23.40
CC=US ASN=AS22612 namecheap inc.
ip203.161.60.59
CC=US ASN=AS22612 namecheap inc.
ip208.109.244.86
CC=US ASN=AS26496 godaddy.com llc
ip208.109.39.196
CC=US ASN=AS398101 godaddy.com llc
ip64.202.186.223
CC=US ASN=AS26496 godaddy.com llc
ip66.29.133.135
CC=US ASN=AS22612 namecheap inc.
ip72.167.224.193
CC=US ASN=AS26496 godaddy.com llc
ip72.167.52.130
CC=US ASN=AS398101 godaddy.com llc
ip132.148.73.92
CC=US ASN=AS398101 godaddy.com llc

Domain

ValueDescriptionCopy
domainacmsquared.com
domainads2ads.com
domainaghomesandproperties.com
domainallwebdirectories.com
domainamj-international.com
domainapartamentosmalaga.com
domainarmingaud.com
domainbazmepaigham.com
domainbedrijvenregister.com
domainbestshayari.com
domainbrillianceboundielts.com
domainbrownak.com
domainbuildonhope.com
domaincappadociavisittours.com
domaincatering-amato.com
domaincccsok.com
domaincitywideprayer.com
domaincontrolunlimited.com
domaincoralridgehour.com
domaindartsinireland.com
domaindata-logistics.com
domaindhoughton.com
domaindogcuty.com
domaine-briefe.com
domaineggcoo.com
domaineheringe-trauringe.com
domainehsantrust.com
domainesdetodo.com
domainfluffybascha.com
domainforty-something.com
domainfreaksandfriends.com
domaingeegletee.com
domaingeorgiayr.com
domaingoraba.com
domainhafikoman.com
domainheisseliebe.com
domainhurenkontakte.com
domainideallivingsolutions.com
domainigreensoft.com
domainilchirone.com
domainimpexinc.com
domaininkdchronicles.com
domainintellipex.com
domainintercuba.com
domainispamembers.com
domainjimmylange.com
domainjoshuasdodds.com
domainkbdav.com
domainl2storm.com
domainlittlenuggetsco.com
domainlost-signal.com
domainlpdeco.com
domainmonnalissaboutique.com
domainmpoterbaru2024.com
domainmykidsfashion.com
domainnorthstarcouncil.com
domainqrcodespoweredbygs1.com
domainschnaitsee.com
domainsercanaydin.com
domainsrpskazemlja.com
domainthelovecity.com
domainthermalresistivity.com
domaintransusasia.com
domaintubeunderwater.com
domainweddingsarahetemmanuel.com
domainwinbet299mas.com
domainyoopuipui.com

Threat ID: 69307b18b129615efa19324a

Added to database: 12/3/2025, 6:02:00 PM

Last enriched: 12/3/2025, 6:14:15 PM

Last updated: 1/19/2026, 4:37:25 AM

Views: 220

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats