Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

FlowerStorm

30
Global rank
5
Month rank
5 infographic chevron week
Week rank
0
IOCs

FlowerStorm is a phishing-as-a-service (PhaaS) platform used by cybercriminals to steal Microsoft 365 credentials and bypass multi-factor authentication (MFA) protections through adversary-in-the-middle (AiTM) attacks. Emerging after the disruption of Rockstar2FA in late 2024, FlowerStorm rapidly gained popularity among attackers targeting enterprises across North America and Europe.

Phishingkit
Type
Unknown
Origin
1 June, 2024
First seen
9 May, 2026
Last seen

How to analyze FlowerStorm with ANY.RUN

Type
Unknown
Origin
1 June, 2024
First seen
9 May, 2026
Last seen

IOCs

Last Seen at

Recent blog posts

post image
How CISOs Reduce Cyber Risk with MITRE ATT&am...
watchers 2457
comments 0
post image
New Phishing Campaign Targets US with Credent...
watchers 6984
comments 0
post image
Release Notes: Expanded Threat Intelligence A...
watchers 10118
comments 0

FlowerStorm Rising: From Rockstar2FA Successor to Enterprise Account Takeover Machine

Key Takeaways

  1. FlowerStorm is a phishing-as-a-service platform focused on Microsoft 365 credential theft.
  2. The platform uses adversary-in-the-middle phishing to bypass MFA protections.
  3. Professional services, finance, manufacturing, and legal sectors are among the most targeted industries.
  4. FlowerStorm emerged after the disruption of Rockstar2FA and inherited many similar techniques.
  5. Stolen Microsoft 365 sessions can lead to BEC fraud, lateral movement, and large-scale compromise.
  6. Rapidly rotating phishing infrastructure makes traditional blocking approaches less effective. Detection relies on behavioral anomalies rather than just signatures.
  7. ANY.RUN's Threat Intelligence Lookup lets analysts instantly query any suspicious indicator against a vast, sandbox-validated database to confirm FlowerStorm association and see the full attack context.

destinationIP:"172.67.215.79".

FlowerStorm IP in sandbox analyses FlowerStorm IP in sandbox analyses

Threat Intelligence Feeds automatically streams verified FlowerStorm IOCs (malicious IPs, domains, URLs) directly into SIEM, IDS/IPS, and EDR systems in STIX/TAXII format, enabling automated blocking of new phishing infrastructure before it reaches users.

What is FlowerStorm Malware?

FlowerStorm is a commercially operated PhaaS platform that equips threat actors with everything needed to run professional-grade phishing campaigns. Unlike traditional phishing kits that simply collect entered passwords, FlowerStorm employs real-time AiTM proxy infrastructure. When a victim visits a fake Microsoft 365 login page and authenticates, FlowerStorm's backend relays those credentials to the real Microsoft service, intercepts the resulting authenticated session cookie, and delivers it to the attacker. The attacker can then replay that cookie and gain full access to the victim's account without ever knowing their password or needing to satisfy an MFA prompt.

The platform shares extensive structural and operational similarities with Rockstar2FA, a preceding PhaaS operation, with researchers suggesting at minimum a common ancestry between the two.

FlowerStorm's phishing portals are designed to closely mimic legitimate Microsoft 365 login pages, complete with Cloudflare Turnstile CAPTCHA challenges to block automated security scanners.

Credential data and JWT session tokens are exfiltrated to attacker-controlled backend servers using a standardized PHP file (next.php), which communicates via .ru, .moscow, and .com domains, as well as Cloudflare Pages infrastructure under .dev domains. The platform supports email validation, MFA relay, and session tracking, making it a complete identity theft engine.

ANY.RUN’s Interactive Sandbox allows to safely detonate FlowerStorm samples and analyse full attack chain, connections, and processes:

View sandbox session

FlowerStorm analysis in Interactive Sandbox FlowerStorm detonated in Interactive Sandbox

The platform uses plant-themed HTML titles (e.g., "Sprout," "Blossom," "Flower," "Leaf") for its phishing pages. It operates as a subscription service, often managed via Telegram bots, allowing even less-skilled attackers to deploy convincing fake Microsoft login portals.

How FlowerStorm Threatens Businesses and Organizations

FlowerStorm poses severe risks by enabling full account takeover of Microsoft 365 and associated enterprise resources. Once attackers obtain session tokens:

  • They gain persistent access without passwords or ongoing MFA prompts.
  • Attackers can perform lateral movement, data exfiltration, privilege escalation (e.g., password resets, role changes), and deployment of additional malware or ransomware.
  • Compromised accounts serve as entry points for business email compromise (BEC), supply chain attacks, or intellectual property theft.
  • Financial losses, regulatory fines (e.g., GDPR), reputational damage, and operational disruptions often follow.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

Victimology: Who Is Most at Risk?

FlowerStorm and similar AiTM PhaaS kits disproportionately target organizations heavily reliant on Microsoft 365 for email, collaboration, and identity management.

Especially vulnerable sectors include:

  • Services (e.g., engineering, consulting, legal, real estate). High volume of email-based workflows.
  • Finance and Insurance. High-value data; targeted with spearphishing (e.g., QR-code PDFs).
  • Manufacturing and Retail. Supply chain and operational dependencies.
  • Healthcare and IT/Telecom. Critical data and infrastructure (e.g., recent German campaigns).

How FlowerStorm Gets In the System and Spreads?

FlowerStorm's attack chain begins at the inbox and, if successful, expands through the victim's network and contacts. The initial delivery mechanism relies primarily on crafted phishing emails, with the platform providing affiliates with the infrastructure to customize and deploy campaigns at scale.

Initial Delivery:

Victims receive a phishing email designed to create urgency or simulate a legitimate notification. FlowerStorm operators and their affiliates have used a variety of lure themes, including Microsoft security alerts, shared document notifications, HR communications (such as new employee announcements), and invoice or payment requests. The email contains a link that begins redirecting the victim through a chain of intermediary pages often hosted on legitimate services like Cloudflare Pages to obscure the final malicious destination from email security scanners.

Evasion of Automated Detection:

Multiple stages in the redirect chain use legitimate infrastructure (cloud CDNs, trusted domains) to make individual URLs appear benign. Cloudflare Turnstile CAPTCHA challenges are embedded in the phishing pages both to appear legitimate and to prevent security bots and web crawlers from analyzing the final landing page. The platform also employs JavaScript-based conditional page loading, so the malicious content is only served if the visitor appears to be a genuine human user.

Credential and Session Theft:

Once the victim reaches the fake Microsoft 365 login page and enters their credentials, FlowerStorm's AiTM proxy relays those credentials to the real Microsoft authentication service in real time. The victim successfully completes their MFA challenge (SMS code, authenticator app, push notification), and the resulting authenticated session cookie is intercepted by FlowerStorm's backend server via the next.php communication file. The victim is then redirected to a legitimate Microsoft page, often experiencing nothing unusual.

Post-Compromise Spread:

With a valid session cookie, the attacker logs into the victim's Microsoft 365 account. From this position, the attack can spread in several directions: internal phishing emails sent from the trusted compromised account, access to connected applications and data stores, password resets and privilege escalation to deepen control, and creation of persistent access mechanisms such as new OAuth app authorizations or hidden inbox rules.

How FlowerStorm Malware Functions

At its core, FlowerStorm is a reverse-proxy phishing platform.

AiTM Proxy Architecture:

The attacker's server acts as a real-time man-in-the-middle between the victim's browser and the legitimate Microsoft authentication service. When the victim submits credentials, the proxy forwards them to Microsoft, receives a valid response (including an MFA challenge), and relays that challenge back to the victim. When the victim completes the MFA step, Microsoft issues an authenticated session cookie, which the proxy intercepts before passing the legitimate session back to the user.

Backend Communication (next.php):

FlowerStorm standardized its backend communication around a PHP file called next.php. This file handles credential transmission (email, password), JWT token exchange for session tracking, MFA relay logic, and success/failure signaling.

Anti-Bot and Evasion Mechanisms:

  • Cloudflare Turnstile CAPTCHA (both legitimate integrations and customized implementations)
  • Random junk text in HTML comments to frustrate pattern-matching
  • Multi-stage redirect chains through legitimate CDNs and hosting services
  • JavaScript-driven conditional rendering to serve malicious content only to verified human visitors
  • Domain rotation and use of Cloudflare services for hosting resilience

Credential Harvesting Fields:

The phishing portal captures standard Microsoft login fields (email, password) along with MFA tokens and session identifiers. The backend supports email-address validation (to confirm a target is a genuine corporate user before serving the full phishing flow) and dynamic MFA challenge relay.

How Businesses Can Proactively Protect Against FlowerStorm

Modern phishing threats move too quickly for static indicators alone. Security teams need continuous visibility into:

  • Emerging phishing domains,
  • Infrastructure overlaps,
  • IOC relationships,
  • Active attack patterns,
  • Malware delivery chains.

This is where Threat Intelligence becomes operational rather than theoretical.

With Threat Intelligence Lookup, analysts can:

  • Search FlowerStorm-related IOCs
  • Correlate domains, IPs, and phishing artifacts
  • Identify infrastructure reuse
  • Investigate suspicious Microsoft 365 phishing activity
  • Hunt for campaign overlaps

This helps SOC teams pivot from isolated alerts to full attack-chain visibility. Start the research with the threat name:

threatName:"flowerstorm".

FlowerStorm summary in TI Lookup FlowerStorm summary in TI Lookup

Threat Intelligence Feeds help organizations to:

  • Continuously ingest fresh FlowerStorm indicators
  • Automate detections,
  • Enrich SIEM and SOAR workflows,
  • Block malicious domains proactively,
  • Improve phishing detection coverage.

The biggest advantage is speed. FlowerStorm infrastructure changes rapidly, so automated IOC enrichment becomes critical.

Additional Measures:

Organizations should also:

  • Deploy phishing-resistant MFA such as FIDO2
  • Monitor impossible travel and session anomalies
  • Implement conditional access policies
  • Conduct continuous phishing awareness training
  • Use sandbox analysis for suspicious files and links
  • Monitor for MFA fatigue and session hijacking indicators
  • Harden Microsoft 365 identity protections

A layered defense strategy is essential because no single control can stop AiTM phishing alone.

FlowerStorm Sandbox Analysis

Using ANY.RUN’s Interactive Sandbox, analysts can detonate a suspicious file or a link, get it detected as a FlowerStorm attack sample, and observe the behavior, TTPs, and kill chain along with gathering additional IOCs.

View FlowerStorm analysis session

FlowerStorm summary in TI Lookup FlowerStorm summary in TI Lookup

The attack begins with an email disguised as a work document, a protected attachment, or a notification requiring review. Instead of being taken directly to a phishing page, the user is often first directed to an intermediate screen with a button to access the document or confirm opening the file.

File opening request File opening request

An important detail for SOC teams: The intermediate page can be hosted on legitimate infrastructure, such as platforms like Google Sites. This increases the victim’s trust and simultaneously complicates early detection, because the first stage of the attack chain passes through a well-known and generally legitimate service rather than an obviously malicious resource.

Page hosted on Google Sites Page hosted on Google Sites

Next, the victim is redirected to a fake login page styled to look like Microsoft 365 or another cloud service. Visually, it replicates the normal authentication process: a familiar interface, standard login steps, and typical credential verification logic.

Fake Microsoft sign-in form Fake Microsoft sign-in form

The key feature of FlowerStorm is that it does not operate as a primitive login and password stealer. Its goal is to guide the user through the entire authentication process, including the second factor, in order to obtain not only credentials but also artifacts of an active session. This allows attackers to use already authenticated access and bypass MFA not by “breaking” it, but by essentially hijacking the result of a successful login.

CAPTCHA or other anti-bot checks are often used in the chain. For attackers, this serves two purposes at once: such elements make the scenario more believable to the user and simultaneously hinder sandboxes, URL scanners, and some automated analysis tools from seeing the full attack chain. ANY.RUN’s Sandbox can interact with such elements emulating user behavior:

CAPTCHA bypassed by Sandbox CAPTCHA bypassed by Sandbox

After successfully completing all stages, attackers gain access to the cloud session and can act on behalf of the user without triggering immediate additional MFA prompts. Therefore, the real danger of FlowerStorm lies not only in stealing the password, but in the subsequent session hijacking, which can outwardly appear as normal user activity.

Integrate ANY.RUN’s threat intelligence solutions in your company

Contact us

Conclusion

FlowerStorm represents the commoditization of advanced AiTM phishing, lowering the barrier for attackers while raising the stakes for organizations. Its rapid evolution and focus on Microsoft 365 highlight the need for proactive, intelligence-driven defenses beyond traditional MFA. By combining human vigilance with advanced tools like ANY.RUN's TI solutions and robust identity security, businesses can significantly reduce exposure.

Trial TI Lookup to start gathering actionable threat intelligence on the malware that threatens your business sector and region: just sign up to ANY.RUN.

HAVE A LOOK AT

Fog Ransomware screenshot
Fog is a ransomware strain that locks and steals sensitive information both on Windows and Linux endpoints. The medial ransom demand is $220,000. The medial payment is $100,000. First spotted in the spring of 2024, it was used to attack educational organizations in the USA, later expanding on other sectors and countries. Main distribution method — compromised VPN credentials.
Read More
Socelars screenshot
Socelars
socelars
Socelars is an information-stealing Trojan (often categorized as spyware/stealer) that focuses on collecting sensitive data from Windows systems, with standout reporting around Facebook Ads Manager and session cookie theft. Unlike “noisy” malware that immediately breaks something, Socelars quietly converts a single infected machine into access: logged-in sessions, business account data, and pathways to monetization.
Read More
DarkVision screenshot
DarkVision
darkvision
DarkVision RAT is a low-cost, modular Remote Access Trojan that gives attackers remote control of infected Windows hosts. Initially observed around 2020 and sold in underground marketplaces, DarkVision has become notable for its full feature set (keylogging, screen capture, file theft, remote command execution and plugin support) and for being distributed via multi-stage loaders in recent campaigns.
Read More
Agent Tesla screenshot
Agent Tesla
agenttesla trojan rat stealer
Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.
Read More
Meduza Stealer screenshot
Meduza Stealer is an information-stealing malware primarily targeting Windows systems, designed to harvest sensitive data such as login credentials, browsing histories, cookies, cryptocurrency wallets, and password manager data. It has advanced anti-detection mechanisms, allowing it to evade many antivirus programs. The malware is distributed through various means, including phishing emails and malicious links. It’s marketed on underground forums and Telegram channels.
Read More
Phorpiex screenshot
Phorpiex
phorpiex
Phorpiex is a malicious software that has been a significant threat in the cybersecurity landscape since 2016. It is a modular malware known for its ability to maintain an extensive botnet. Unlike other botnets, Phorpiex does not concentrate on DDoS attacks. Instead, it has been involved in numerous large-scale spam email campaigns and the distribution of other malicious payloads, such as LockBit.
Read More