Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale

0
Medium
Phishingrce
Published: Fri Dec 12 2025 (12/12/2025, 14:04:00 UTC)
Source: The Hacker News

Description

Cybersecurity researchers have documented four new phishing kits named BlackForce, GhostFrame, InboxPrime AI, and Spiderman that are capable of facilitating credential theft at scale. BlackForce, first detected in August 2025, is designed to steal credentials and perform Man-in-the-Browser (MitB) attacks to capture one-time passwords (OTPs) and bypass multi-factor authentication (MFA). The kit

AI-Powered Analysis

AILast updated: 12/12/2025, 14:16:45 UTC

Technical Analysis

Recent cybersecurity research has uncovered four sophisticated phishing kits—BlackForce, GhostFrame, InboxPrime AI, and Spiderman—that utilize artificial intelligence and advanced evasion tactics to steal user credentials at scale. BlackForce, first identified in August 2025, is particularly notable for its capability to conduct Man-in-the-Browser (MitB) attacks, enabling it to intercept one-time passwords (OTPs) and effectively bypass multi-factor authentication (MFA) protections. These kits automate the phishing process, increasing the volume and success rate of credential theft campaigns. The use of AI allows these kits to craft more convincing phishing pages and potentially adapt dynamically to evade detection. By capturing both primary credentials and secondary authentication tokens, these kits undermine the security benefits of MFA, which many organizations rely on to secure user access. Although no known exploits have been reported in the wild yet, the technical sophistication and scale potential make these kits a significant emerging threat. The kits do not require complex user interaction beyond standard phishing engagement, making them accessible to a wide range of attackers. The threat landscape is evolving as attackers integrate AI and MitB techniques to circumvent traditional security controls, necessitating updated defensive strategies.

Potential Impact

For European organizations, the emergence of these advanced phishing kits poses a critical risk to the confidentiality and integrity of user credentials and sensitive data. Organizations with widespread MFA deployment may experience a false sense of security, as these kits specifically target MFA mechanisms to bypass them. Successful credential theft can lead to unauthorized access to corporate networks, financial fraud, data breaches, and disruption of services. The automation and AI-driven nature of these kits allow attackers to scale attacks rapidly, increasing the likelihood of successful compromises across multiple sectors including finance, healthcare, government, and critical infrastructure. The potential for Man-in-the-Browser attacks further exacerbates the threat by enabling attackers to manipulate transactions and communications in real-time without detection. This could lead to significant financial losses, reputational damage, and regulatory penalties under GDPR for failure to protect personal data. The evolving threat landscape demands heightened vigilance and adaptive security measures to mitigate these risks effectively.

Mitigation Recommendations

European organizations should implement multi-layered defenses beyond standard MFA to mitigate these threats. Deploy phishing-resistant MFA methods such as hardware security keys (FIDO2/WebAuthn) or certificate-based authentication that are not vulnerable to MitB interception. Enhance user awareness programs focusing on recognizing sophisticated phishing tactics and the risks of interacting with unsolicited links or attachments. Implement real-time monitoring and anomaly detection systems capable of identifying unusual authentication patterns and MitB activity. Employ browser isolation or endpoint detection and response (EDR) solutions to detect and block MitB malware. Regularly update and patch all software to reduce attack surface. Conduct phishing simulation exercises to test and improve organizational resilience. Collaborate with threat intelligence sharing platforms to stay informed about emerging phishing kits and tactics. Finally, enforce strict access controls and network segmentation to limit the impact of compromised credentials.

Need more detailed analysis?Get Pro

Technical Details

Article Source
{"url":"https://thehackernews.com/2025/12/new-advanced-phishing-kits-use-ai-and.html","fetched":true,"fetchedAt":"2025-12-12T14:16:31.716Z","wordCount":2092}

Threat ID: 693c23bffd2a1aad42520e34

Added to database: 12/12/2025, 2:16:31 PM

Last enriched: 12/12/2025, 2:16:45 PM

Last updated: 12/12/2025, 4:31:27 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats