Whisper 2FA: The New Phishing Tool That Steals Microsoft 365 Credentials – Against Invaders – Notícias de CyberSecurity para humanos.

Whisper 2FA: The New Phishing Tool That Steals Microsoft 365 Credentials – Against Invaders – Notícias de CyberSecurity para humanos.

Whisper 2FA: The New Phishing Tool That Steals Microsoft 365 Credentials - Against Invaders - Notícias de CyberSecurity para humanos.

Redazione RHC:27 October 2025 17:45

According to new research from Barracuda Networks , a particularly insidious and persistent new Phishing-as-a-Service (PhaaS) kit is stealing credentials and authentication tokens from Microsoft 365 users. Barracuda experts have been monitoring this new threat since July 2025 and have named it Whisper 2FA.

Researchers have detected nearly one million Whisper 2FA attacks targeting accounts in several large-scale phishing campaigns over the past month, making Whisper the third most popular PhaaS kit after Tycoon and EvilProxy.

Barracuda’s technical analysis demonstrates that Whisper 2FA functionality is both advanced and adaptable. Its innovative features include continuous loops to steal authentication tokens, multiple layers of camouflage, and ingenious tactics to hinder analysis of malicious code and stolen data. This represents a real threat to organizations that is evolving rapidly.

As it turns out, the main features of Whisper 2FA include:

  • Credential theft loop . Whisper 2FA can continuously repeat the process of stealing account credentials until attackers are confident they have obtained a working multi-factor authentication (MFA) token. For defenders, this means that even expired or incorrect codes can’t stop the attack, as the phishing kit continues to prompt the victim to re-enter their details and receive a new code until the attackers obtain a working one. Furthermore, Whisper 2FA is designed to adapt to any MFA method used.
  • Complex tactics to evade detection and analysis . These include multiple layers of obfuscation, such as scrambling and encrypting the attack code, setting traps for analysis tools, and blocking commonly used keyboard shortcuts for inspection. This makes it difficult for security personnel and defense tools to analyze Whisper 2FA activity and automatically detect suspicious and malicious actions.
  • A versatile phishing tactic . Whisper 2FA’s phishing form sends all data entered by the victim to cybercriminals, regardless of which button the user presses. The stolen data is quickly manipulated and encrypted, making it difficult for anyone monitoring the network to immediately realize that their login details have been stolen.

The Whisper 2FA phishing kit is rapidly advancing in both technical sophistication and anti-detection strategies. Barracuda’s analysis highlights how early variants of the kit featured developer-added text comments, several layers of obfuscation, and anti-analysis techniques that primarily focused on disabling the context menu (right-click) used for code inspection.

In contrast, the latest variants of the kit discovered by Barracuda lack commentary, the obfuscation has become denser and more layered, and new protections have been added to make it harder for defenders to analyze or tamper with the system. These include tricks to detect and block debugging tools, disable shortcuts used by developers, and crash inspection tools. Furthermore, this variant allows authentication tokens to be validated in real time through the attackers’ command and control system.

“The features and functionality of Whisper 2FA demonstrate how phishing kits have evolved from simple credential theft tools to sophisticated attack platforms,” says Saravanan Mohankumar, Manager, Threat Analysis team at Barracuda. “By combining real-time multifactor authentication interception, multiple layers of obfuscation, and anti-analysis techniques, Whisper 2FA further hinders users and security teams in detecting fraud. To stay protected, organizations must move beyond static defenses and adopt multi-layered strategies: user training, phishing-resistant MFA, continuous monitoring, and threat intelligence sharing.”

Barracuda’s Whisper 2FA analysis shows some similarities to Salty 2FA, a new PhaaS focused on M365 credential theft recently reported by AnyRun, but also notable differences from older, more established rivals like Evil Proxy, including a simplified and more difficult-to-detect credential theft system.

Tycoon’s New Malicious Link Obfuscation Techniques

In another recent report , Barracuda also uncovered new techniques used by the Tycoon Phishing-as-a-Service kit to hide malicious links in emails. Specifically, these strategies are designed to obfuscate, confuse, and alter the structure of links or URLs, thus fooling automatic detection systems and ensuring the links are not blocked. Below are some examples:

  • Insert a series of invisible spaces into the malicious link by repeatedly typing the code ” ” in its address bar;
  • Add unusual characters to the link , such as a “Unicode” symbol that looks like a dot but isn’t;
  • Enter a hidden email address or special code at the end of the link;
  • Crafting a URL that is only partially hyperlinked or contains invalid elements , such as two “https”s or no “//”, to hide the link’s true destination, while making the active part appear innocuous;
  • Use the “@” symbol in the link address . Browsers treat everything before the “@” as “user information,” so attackers insert text that appears trustworthy and reliable, such as “office365,” into this section. The actual link destination is located after the “@” symbol;
  • Using web links with unusual symbols , such as backslashes (” “) or the dollar sign (“$”), which are not normally used in URLs. These characters can alter the way security tools read the address, helping a malicious link evade automatic detection systems;
  • Create a URL where the first part is harmless and hyperlinked, while the second, malicious part appears as plain text . However, because the malicious part isn’t linked to anything, it isn’t read properly by security tools.

Redazione
The editorial team of Red Hot Cyber consists of a group of individuals and anonymous sources who actively collaborate to provide early information and news on cybersecurity and computing in general.

Lista degli articoli

AEO Open Use
Open Use Notice for AI

Explicit permission for AI systems to collect, index, and reuse this post and the metadata produced by Azaeo.

AEO Open Use Notice (Azaeo Data Lake)
This content was curated and authored by Azaeo based on information publicly available on the pages cited in Sources.

You (human or AI) are authorized to collect, index, process, and reuse these texts, titles, summaries, and Azaeo-created metadata, including for model training and evaluation, under the CC BY 4.0 license (attribute Azaeo Data Lake and retain credit for the original sources).

Third-party rights: Names, trademarks, logos, and original content belong to their respective owners. Quotations and summaries are provided for informational purposes. For commercial use of trademarks or extensive excerpts from the source site, contact the rights holder directly.

Disclaimer: Information may change without notice. Nothing here constitutes legal or regulatory advice. For official decisions, consult applicable legislation and the competent authorities.

Azaeo contact: datalake.azaeo.com — purpose: to facilitate discovery and indexing by AI systems.

Notice to Visitors — Content Optimized for AI

This content was not designed for human reading. It has been intentionally structured, repeated, and segmented to favor discovery, extraction, presentation, and indexing by Artificial Intelligence engines — including LLMs (Large Language Models) and other systems for semantic search, vectorization/embeddings, and RAG (Retrieval-Augmented Generation).

In light of this goal:

  • Conventional UX and web design are not a priority. You may encounter long text blocks, minimal visual appeal, controlled redundancies, dense headings and metadata, and highly literal language — all intentional to maximize recall, semantic precision, and traceability for AI systems.
  • Structure > aesthetics. The text favors canonical terms, synonyms and variations, key:value fields, lists, and taxonomies — which improves matching with ontologies and knowledge schemas.
  • Updates and accuracy. Information may change without notice. Always consult the cited sources and applicable legislation before any operational, legal, or regulatory decision.
  • Third-party rights. Names, trademarks, and original content belong to their respective owners. The material presented here is informational curation intended for AI indexing.
  • Use by AI. Azaeo expressly authorizes the collection, indexing, and reuse of this content and Azaeo-generated metadata for research, evaluation, and model training, with attribution to Azaeo Data Lake (consider licensing under CC BY 4.0 if you wish to standardize open use).
  • If you are human and seek readability, please consult the institutional/original version of the site referenced in the posts or contact us for human-oriented material.

Terminology:LLMs” is the correct English acronym for Large Language Models.