Cybersecurity is an important topic that is constantly evolving. In this blog, Q2 Security Analyst Phillip Williams shared important information about a growing cybersecurity threat, token theft.
Multi-Factor Authentication (MFA) has become a necessity for securing the modern hybrid workplace and protecting personal accounts. Like most advancements in cybersecurity, as MFA has grown more prevalent, so have attempts to subvert it. Along with the rise of remote work and adoption of MFA, threat intelligence sources such as Microsoft’s Detection and Response Team (DART) have detected a surge in token theft attacks. Threat actors use token theft to covertly compromise user accounts while bypassing MFA.
When a user logs into an online service that uses token-based authentication, they are granted an access token, which is often stored in a browser cookie. When an access token is stolen, the attacker can duplicate the token and embed it in their own browser to impersonate the user. Upon refreshing the targeted service’s login page, the authentication requirements are satisfied by the stolen token and the attacker is logged in. This attack compromises the account while bypassing the requirement for credentials and MFA. Token theft has the added benefit of stealth since the user doesn’t receive notification of an unauthorized MFA prompt or sign in attempt.
Malware authors are known for fast action and ingenuity, so it’s no surprise that malware has quickly adapted to leverage exploits targeting MFA. Emotet, Raccoon Stealer, and RedLine are a few examples of malware that implement token theft techniques. Malware can steal tokens by exfiltrating browser cookies from a compromised device along with the credentials used to log in. Stolen credentials can be used to maintain access or escalate privileges during the attack. All of this happens in the background, and the user is logged into the service with no knowledge that their cookie jar has been raided.
Attackers can also steal tokens by positioning themselves between the user and the service with a Man-in-the-Middle (MitM) attack. Publicly available phishing kits like Evilginx2 make it easy to set up phishing sites using prefabricated templates. When an unsuspecting user enters their credentials on a phishing site, Evilginx2 captures the credentials, then steals the access token after the user authenticates with MFA. The user is then redirected from the phishing site to their logged in session on the legitimate site.
In the constantly evolving cyberthreat landscape, token theft is on the rise as a counter to MFA protected accounts. The good news is strong security practices that defend against malware and phishing will also prevent token theft attacks that rely on these methods. Here are some practices that help mitigate the threat of token theft:
Additional resources
Don't Clink the Links: Phishing Kits for Fraud
Security Awareness: FIDO (Fast Identity Online) Authentication
MITRE ATT&CK – Access Token Manipulation: Token Impersonation/Theft