Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Salty 2FA: Undetected PhaaS Hitting US and EU Industries

0
Medium
Published: Tue Aug 19 2025 (08/19/2025, 17:08:35 UTC)
Source: AlienVault OTX General

Description

A new Phishing-as-a-Service (PhaaS) framework dubbed Salty 2FA has been discovered targeting industries in the US and EU. It uses a unique domain pattern combining .com subdomains with .ru domains and employs a multi-stage execution chain to resist detection. The kit can bypass multiple 2FA methods, including push, SMS, and voice. Victims span global industries such as finance, telecom, energy, consulting, logistics, and education. Static IOCs are unreliable for detection; instead, behavioral patterns must be identified. The framework shares traits with Storm-1575 but has distinct characteristics setting it apart from known threats like Tycoon2FA or EvilProxy. It demonstrates sophisticated capabilities in distributing phishing payloads, maintaining dynamic infrastructure, and managing complex communication between phishing pages and C2 servers.

AI-Powered Analysis

AILast updated: 09/19/2025, 00:07:37 UTC

Technical Analysis

Salty 2FA is a recently identified Phishing-as-a-Service (PhaaS) framework targeting industries across the United States and Europe. This sophisticated threat leverages a unique domain pattern that combines .com subdomains with .ru domains, complicating detection efforts based on static indicators of compromise (IOCs). The framework employs a multi-stage execution chain designed to evade traditional security mechanisms and detection tools. Notably, Salty 2FA is capable of bypassing multiple two-factor authentication (2FA) methods, including push notifications, SMS codes, and voice calls, which significantly enhances its ability to compromise accounts protected by 2FA. Victims span a broad range of high-value sectors such as finance, telecommunications, energy, consulting, logistics, and education, indicating a wide attack surface and the targeting of critical infrastructure and sensitive data. Salty 2FA shares some operational traits with the Storm-1575 adversary but maintains distinct characteristics that differentiate it from other known phishing frameworks like Tycoon2FA or EvilProxy. Its infrastructure is dynamic, with complex command-and-control (C2) communication protocols that facilitate the distribution of phishing payloads and management of the phishing infrastructure. Due to the dynamic nature of its domains and IP addresses, static IOCs are unreliable for detection; instead, behavioral analysis focusing on the multi-stage execution chain and anomalous network communications is required. Indicators associated with Salty 2FA include IP addresses such as 153.127.234.4, 153.127.234.5, and 191.96.207.129, and domains like marketplace24ei.ru and telephony.nexttradeitaly.com. Although there are no known exploits in the wild at this time, the threat poses a medium-severity risk due to its ability to circumvent 2FA and target critical sectors.

Potential Impact

For European organizations, Salty 2FA presents a significant threat to the confidentiality, integrity, and availability of sensitive data and critical systems. By bypassing multiple 2FA mechanisms, attackers can gain unauthorized access to corporate accounts, potentially leading to data breaches, financial fraud, and disruption of essential services. The finance and energy sectors are particularly vulnerable given their regulatory obligations and the sensitive nature of their operations. Telecommunications and consulting firms risk reputational damage and loss of client trust if compromised. The multi-stage, dynamic infrastructure complicates detection and response efforts, increasing the likelihood of prolonged undetected intrusions. Organizations lacking advanced behavioral detection capabilities may fail to identify the threat promptly, exacerbating potential damage. The broad targeting across sectors also raises concerns about supply chain compromises, where attackers leverage access to one organization to infiltrate partners or clients. Consequences may include operational disruptions, GDPR-related regulatory penalties for data breaches, and significant financial losses.

Mitigation Recommendations

European organizations should adopt advanced behavioral analytics and anomaly detection systems capable of identifying phishing attempts that evade traditional static IOC-based defenses. Deploying Endpoint Detection and Response (EDR) solutions with capabilities to monitor multi-stage execution chains and unusual network communications is critical. User awareness training must be enhanced to address sophisticated phishing tactics that bypass 2FA, emphasizing vigilance even when 2FA prompts appear legitimate. Implementing adaptive, risk-based authentication methods can reduce reliance on static 2FA mechanisms vulnerable to bypass. Network segmentation and strict access controls should be enforced to limit lateral movement in case of credential compromise. DNS filtering and firewall rules must be configured to monitor and block access to suspicious domains and IP addresses associated with Salty 2FA infrastructure, such as marketplace24ei.ru and telephony.nexttradeitaly.com. Incident response teams should prepare and regularly update playbooks for phishing attacks, including rapid containment and credential reset procedures. Collaboration with threat intelligence sharing platforms is recommended to receive timely updates on evolving phishing infrastructure. Finally, deploying phishing-resistant authentication methods, such as hardware security keys compliant with FIDO2 standards, can significantly mitigate risks associated with 2FA bypass.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://any.run/cybersecurity-blog/salty2fa-technical-analysis"]
Adversary
Storm-1575
Pulse Id
68a4af934fc77632709983fc
Threat Score
null

Indicators of Compromise

Ip

ValueDescriptionCopy
ip153.127.234.4
ip153.127.234.5
ip191.96.207.129

Url

ValueDescriptionCopy
urlhttp://marketplace24ei.ru//
urlhttp://marketplace24ei.ru/790628.php
urlhttp://telephony.nexttradeitaly.com/SSSuWBTmYwu/

Domain

ValueDescriptionCopy
domaininnovationsteams.com
domainmarketplace24ei.ru
domaintelephony.nexttradeitaly.com

Threat ID: 68a4ed7fad5a09ad00fba95c

Added to database: 8/19/2025, 9:32:47 PM

Last enriched: 9/19/2025, 12:07:37 AM

Last updated: 10/4/2025, 3:52:53 PM

Views: 144

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats