New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale
Cybersecurity researchers have documented four new phishing kits named BlackForce, GhostFrame, InboxPrime AI, and Spiderman that are capable of facilitating credential theft at scale. BlackForce, first detected in August 2025, is designed to steal credentials and perform Man-in-the-Browser (MitB) attacks to capture one-time passwords (OTPs) and bypass multi-factor authentication (MFA). The kit
AI Analysis
Technical Summary
Recent cybersecurity research has uncovered four sophisticated phishing kits—BlackForce, GhostFrame, InboxPrime AI, and Spiderman—that utilize artificial intelligence and advanced evasion tactics to steal user credentials at scale. BlackForce, first identified in August 2025, is particularly notable for its capability to conduct Man-in-the-Browser (MitB) attacks, enabling it to intercept one-time passwords (OTPs) and effectively bypass multi-factor authentication (MFA) protections. These kits automate the phishing process, increasing the volume and success rate of credential theft campaigns. The use of AI allows these kits to craft more convincing phishing pages and potentially adapt dynamically to evade detection. By capturing both primary credentials and secondary authentication tokens, these kits undermine the security benefits of MFA, which many organizations rely on to secure user access. Although no known exploits have been reported in the wild yet, the technical sophistication and scale potential make these kits a significant emerging threat. The kits do not require complex user interaction beyond standard phishing engagement, making them accessible to a wide range of attackers. The threat landscape is evolving as attackers integrate AI and MitB techniques to circumvent traditional security controls, necessitating updated defensive strategies.
Potential Impact
For European organizations, the emergence of these advanced phishing kits poses a critical risk to the confidentiality and integrity of user credentials and sensitive data. Organizations with widespread MFA deployment may experience a false sense of security, as these kits specifically target MFA mechanisms to bypass them. Successful credential theft can lead to unauthorized access to corporate networks, financial fraud, data breaches, and disruption of services. The automation and AI-driven nature of these kits allow attackers to scale attacks rapidly, increasing the likelihood of successful compromises across multiple sectors including finance, healthcare, government, and critical infrastructure. The potential for Man-in-the-Browser attacks further exacerbates the threat by enabling attackers to manipulate transactions and communications in real-time without detection. This could lead to significant financial losses, reputational damage, and regulatory penalties under GDPR for failure to protect personal data. The evolving threat landscape demands heightened vigilance and adaptive security measures to mitigate these risks effectively.
Mitigation Recommendations
European organizations should implement multi-layered defenses beyond standard MFA to mitigate these threats. Deploy phishing-resistant MFA methods such as hardware security keys (FIDO2/WebAuthn) or certificate-based authentication that are not vulnerable to MitB interception. Enhance user awareness programs focusing on recognizing sophisticated phishing tactics and the risks of interacting with unsolicited links or attachments. Implement real-time monitoring and anomaly detection systems capable of identifying unusual authentication patterns and MitB activity. Employ browser isolation or endpoint detection and response (EDR) solutions to detect and block MitB malware. Regularly update and patch all software to reduce attack surface. Conduct phishing simulation exercises to test and improve organizational resilience. Collaborate with threat intelligence sharing platforms to stay informed about emerging phishing kits and tactics. Finally, enforce strict access controls and network segmentation to limit the impact of compromised credentials.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy
New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale
Description
Cybersecurity researchers have documented four new phishing kits named BlackForce, GhostFrame, InboxPrime AI, and Spiderman that are capable of facilitating credential theft at scale. BlackForce, first detected in August 2025, is designed to steal credentials and perform Man-in-the-Browser (MitB) attacks to capture one-time passwords (OTPs) and bypass multi-factor authentication (MFA). The kit
AI-Powered Analysis
Technical Analysis
Recent cybersecurity research has uncovered four sophisticated phishing kits—BlackForce, GhostFrame, InboxPrime AI, and Spiderman—that utilize artificial intelligence and advanced evasion tactics to steal user credentials at scale. BlackForce, first identified in August 2025, is particularly notable for its capability to conduct Man-in-the-Browser (MitB) attacks, enabling it to intercept one-time passwords (OTPs) and effectively bypass multi-factor authentication (MFA) protections. These kits automate the phishing process, increasing the volume and success rate of credential theft campaigns. The use of AI allows these kits to craft more convincing phishing pages and potentially adapt dynamically to evade detection. By capturing both primary credentials and secondary authentication tokens, these kits undermine the security benefits of MFA, which many organizations rely on to secure user access. Although no known exploits have been reported in the wild yet, the technical sophistication and scale potential make these kits a significant emerging threat. The kits do not require complex user interaction beyond standard phishing engagement, making them accessible to a wide range of attackers. The threat landscape is evolving as attackers integrate AI and MitB techniques to circumvent traditional security controls, necessitating updated defensive strategies.
Potential Impact
For European organizations, the emergence of these advanced phishing kits poses a critical risk to the confidentiality and integrity of user credentials and sensitive data. Organizations with widespread MFA deployment may experience a false sense of security, as these kits specifically target MFA mechanisms to bypass them. Successful credential theft can lead to unauthorized access to corporate networks, financial fraud, data breaches, and disruption of services. The automation and AI-driven nature of these kits allow attackers to scale attacks rapidly, increasing the likelihood of successful compromises across multiple sectors including finance, healthcare, government, and critical infrastructure. The potential for Man-in-the-Browser attacks further exacerbates the threat by enabling attackers to manipulate transactions and communications in real-time without detection. This could lead to significant financial losses, reputational damage, and regulatory penalties under GDPR for failure to protect personal data. The evolving threat landscape demands heightened vigilance and adaptive security measures to mitigate these risks effectively.
Mitigation Recommendations
European organizations should implement multi-layered defenses beyond standard MFA to mitigate these threats. Deploy phishing-resistant MFA methods such as hardware security keys (FIDO2/WebAuthn) or certificate-based authentication that are not vulnerable to MitB interception. Enhance user awareness programs focusing on recognizing sophisticated phishing tactics and the risks of interacting with unsolicited links or attachments. Implement real-time monitoring and anomaly detection systems capable of identifying unusual authentication patterns and MitB activity. Employ browser isolation or endpoint detection and response (EDR) solutions to detect and block MitB malware. Regularly update and patch all software to reduce attack surface. Conduct phishing simulation exercises to test and improve organizational resilience. Collaborate with threat intelligence sharing platforms to stay informed about emerging phishing kits and tactics. Finally, enforce strict access controls and network segmentation to limit the impact of compromised credentials.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2025/12/new-advanced-phishing-kits-use-ai-and.html","fetched":true,"fetchedAt":"2025-12-12T14:16:31.716Z","wordCount":2092}
Threat ID: 693c23bffd2a1aad42520e34
Added to database: 12/12/2025, 2:16:31 PM
Last enriched: 12/12/2025, 2:16:45 PM
Last updated: 12/12/2025, 4:31:27 PM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Where does the data stolen in a phishing attack go? | Kaspersky official blog
MediumNew React RSC Vulnerabilities Enable DoS and Source Code Exposure
HighMicrosoft Bug Bounty Program Expanded to Third-Party Code
CriticalNew React RSC Vulnerabilities Enable DoS and Source Code Exposure
Critical$320,000 Paid Out at Zeroday.Cloud for Open Source Software Exploits
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.