Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

Sneaky 2FA

31
Global rank
16 infographic chevron month
Month rank
13
Week rank
0
IOCs

Sneaky 2FA is an Adversary-in-the-Middle (AiTM) phishing kit targeting Microsoft 365 accounts. Distributed as a Phishing-as-a-Service (PhaaS) through a Telegram bot, this malware bypasses two-factor authentication (2FA) to steal credentials and session cookies, posing a significant threat to individuals and organizations.

Phishingkit
Type
Unknown
Origin
1 October, 2024
First seen
27 September, 2025
Last seen

How to analyze Sneaky 2FA with ANY.RUN

Type
Unknown
Origin
1 October, 2024
First seen
27 September, 2025
Last seen

IOCs

Last Seen at

Recent blog posts

post image
ANY.RUN Sandbox & Microsoft Sentinel: Les...
watchers 377
comments 0
post image
Fighting Telecom Cyberattacks: Investigating...
watchers 1721
comments 0
post image
Efficient SOC: How to Detect and Solve Incide...
watchers 888
comments 0

What is Sneaky 2FA malware?

Sneaky 2FA phishing kit is a malware strain designed to bypass two-factor authentication (2FA), a critical security layer used by individuals and organizations worldwide. By hijacking authentication processes in real-time, this malware undermines what many consider a key safeguard in modern cybersecurity.

It often works as part of a larger attack chain, coordinating with infostealers, remote access trojans (RATs), and phishing kits. Its modular architecture, stealth capabilities, and real-time data interception make it a significant threat in today’s digital landscape.

First detected in October 2024, it is a full-featured phishing kit that compromises Microsoft 365 accounts. Sold via a Telegram-based PhaaS model, it provides cybercriminals with obfuscated source code for independent deployment.

Sneaky 2FA employs advanced anti-bot and anti-analysis measures, such as Cloudflare Turnstile challenges and IP filtering, to evade detection. Its fake Microsoft authentication pages, complete with auto-filled email fields and blurred legitimate interface screenshots, create a convincing illusion of authenticity. Nearly 100 domains hosting Sneaky 2FA phishing pages have been identified.

Sneaky 2FA propagates through multiple distribution channels, leveraging both technical and social engineering techniques:

  • Phishing email campaigns have been observed sending email with pseudo payment receipts to make users open bogus PDF documents containing a QR code that redirects them to a malicious site.
  • Attackers embed QR codes in seemingly legitimate documents, which redirect users to phishing sites when scanned with mobile devices.
  • Campaigns often use urgent or compelling subject lines related to account security, payment notifications, or business-critical communications to encourage immediate action.
  • Attackers may compromise legitimate websites to host phishing pages, lending credibility to malicious content.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

What Sneaky 2FA Can Do to Your Device

Sneaky 2FA's impact extends beyond simple credential theft. Once attackers gain access to Microsoft 365 accounts, they can perform:

  • Session Hijacking: Steal active authentication sessions, allowing immediate access to user accounts without triggering additional security prompts

  • Persistent Access: Maintain long-term access to compromised accounts through stolen authentication tokens

  • Data Exfiltration: Access and download sensitive emails, documents, and organizational data stored in Microsoft 365 services

  • Account Takeover: Gain complete control over user accounts, including the ability to change passwords and security settings

  • Lateral Movement: Use compromised accounts as stepping-stones to access other systems and accounts within the organization

    How Sneaky 2FA Threatens Businesses and Organizations

Sneaky 2FA poses severe risks to businesses, particularly those reliant on Microsoft 365 for operations:

  • Business Email Compromise (BEC) and Financial Losses: Attackers can use compromised executive accounts to initiate fraudulent wire transfers or manipulate business transactions. Sneaky 2FA falls under the class of business email compromise attacks.
  • Data Breaches: Exposure of key corporate data, including customer info, financial records, and strategic plans, leading to business failures, regulatory fines, and reputational damage.
  • Operational Disruption: Compromised accounts can disrupt workflows, especially in critical infrastructure sectors.
  • Supply Chain Attacks: Attackers can use hijacked accounts to target partners or clients, amplifying the impact.

Get started today for free

Analyze malware and phishing in a fully-interactive sandbox

Create free account

How Does Sneaky 2FA Function?

Sneaky 2FA doesn't directly compromise individual computers but rather targets cloud-based accounts and services. The attack starts when users receive phishing emails containing links or QR codes that appear to be from Microsoft or other trusted sources.

After clicking malicious links, they are directed to convincing replicas of Microsoft 365 login pages hosted on attacker-controlled infrastructure. Sneaky 2FA as an adversary-in-the-middle intercepts information sent between a device with Microsoft 365 and a phishing server.

Even when users complete legitimate two-factor verification, the system captures and stores authentication tokens that can be replayed to gain account access. With valid session tokens, attackers can access Microsoft 365 accounts without triggering additional security prompts, effectively bypassing multi-factor authentication.

Samples of Sneaky2FA in action can be observed in ANY.RUN's Interactive Sandbox where the whole attack chain is dissected in a safe virtual machine environment.

Watch an analysis session of Sneaky 2FA fresh sample

Sneaky 2FA analysis in Interactive Sandbox Sneaky 2FA analysis in ANY.RUN Interactive Sandbox

The attack unfolds through a carefully orchestrated series of steps designed to bypass two-factor authentication on Microsoft 365 accounts.

When a victim receives a phishing email, it typically appears as a legitimate security alert or notification from Microsoft 365, encouraging them to click a link. This link may contain an "autograb" feature that pre-fills the victim’s email address on the fake login page, increasing the illusion of authenticity.

Upon clicking the link, the victim encounters first a fake 'Access document' or other lure and then is redirected to a Cloudflare CAPTCHA designed to verify that they are human and to filter out automated bots, proxies, VPNs, or suspicious IP addresses and automated sandboxes without ML recognition. ANY.RUN has Automated interactivity (ML) which will click CAPTCHA. Visitors flagged as bots or researchers are redirected to harmless pages, such as a Wikipedia article, to avoid raising suspicion.

Once the victim passes the challenge, they are presented with a highly realistic fake Microsoft 365 login page, complete with blurred background images taken from actual Microsoft sites to enhance credibility. The victim enters their password, which is immediately captured by the phishing server. The kit then detects the victim’s configured 2FA method and prompts for the second authentication factor.

Acting as an adversary-in-the-middle, the phishing kit captures the 2FA code in real time as the victim submits it. With this information, the attackers hijack the session cookies, effectively bypassing the need for the 2FA code in subsequent accesses and gaining full control over the victim’s Microsoft 365 account.

If user submits URL or a file through API Throughout this process, the Sneaky 2FA kit employs multiple anti-detection techniques, including obfuscation of HTML and JavaScript code (tag obfuscated-js), embedding junk data and base64-encoded images, and using anti-debugging measures to thwart analysis via browser developer tools. The kit’s traffic filtering mechanisms ensure that only genuine targets are exposed to the phishing pages, minimizing the risk of detection by security researchers or automated defenses.

Gathering Threat Intelligence on Sneaky 2FA Malware

Threat intelligence plays a crucial role in defending against Sneaky 2FA and phishing kits in general by providing actionable data about attack patterns, indicators of compromise, and emerging threats. Indicators of Compromise enable proactive blocking of phishing infrastructure, and understanding Sneaky 2FA’s tactics, techniques, and procedures informs detection rules.

Start from searching Sneaky 2FA by the threat name in ANY.RUN Threat Intelligence Lookup:

threatName:"Sneaky2FA"

Sneaky 2FA in TI Lookup Sneaky 2FA sandbox analyses found via ANY.RUN TI Lookup

Extract IOCs from analysis sessions and come back to TI Lookup to research them, enrich them with context, and find associated indicators.

Sneaky 2FA IOCs in the Sandbox Sneaky 2FA IOCs from a sandbox analysis

Integrate ANY.RUN’s threat intelligence solutions in your company

Contact us

Conclusion

Sneaky 2FA illustrates the evolution of phishing attacks, demonstrating how cybercriminals continue to adapt their tactics to bypass increasingly sophisticated security measures. The threat's ability to circumvent two-factor authentication through adversary-in-the-middle techniques highlights the limitations of traditional security approaches and the need for more comprehensive protection strategies. The combination of technical controls, user education, and threat intelligence provides the best defense against this evolving threat landscape.

Gather actionable intelligence via ANY.RUN’s TI Lookup: start with 50 trial requests.

HAVE A LOOK AT

MetaStealer screenshot
MetaStealer
metastealer
MetaStealer is an info-stealing malware primarily targeting sensitive data like login credentials, payment details, and browser history. It typically infects systems via phishing emails or malicious downloads and can exfiltrate data to a command and control (C2) server. MetaStealer is known for its stealthy techniques, including evasion and persistence mechanisms, which make it difficult to detect. This malware has been actively used in various cyberattacks, particularly for financial theft and credential harvesting from individuals and organizations.
Read More
Maze screenshot
Maze
maze ransomware
Maze is ransomware — a malware type that encrypts the victim’s files and restores the data in exchange for a ransom payment. One of the most distinguishable features of Maze is that it is one of the first malware of the kind to publicly release stolen data.
Read More
DeerStealer screenshot
DeerStealer
deerstealer
DeerStealer is an information-stealing malware discovered in 2024 by ANY.RUN, primarily targeting sensitive data such as login credentials, browser history, and cryptocurrency wallet details. It is often distributed through phishing campaigns and fake Google ads that mimic legitimate platforms like Google Authenticator. Once installed, it exfiltrates the stolen data to a remote command and control (C2) server. DeerStealer’s ability to disguise itself as legitimate downloads makes it particularly dangerous for unsuspecting users.
Read More
DarkTortilla screenshot
DarkTortilla
darktortilla
DarkTortilla is a crypter used by attackers to spread harmful software. It can modify system files to stay hidden and active. DarkTortilla is a multi-stage crypter that relies on several components to operate. It is often distributed through phishing sites that look like real services.
Read More
Remote Access Trojan screenshot
Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.
Read More
Fog Ransomware screenshot
Fog is a ransomware strain that locks and steals sensitive information both on Windows and Linux endpoints. The medial ransom demand is $220,000. The medial payment is $100,000. First spotted in the spring of 2024, it was used to attack educational organizations in the USA, later expanding on other sectors and countries. Main distribution method — compromised VPN credentials.
Read More