Description

A recent phishing campaign leveraging the FlowerStorm phishing-as-a-service (PaaS) platform has been targeting Microsoft users by creating deceptive login pages to steal credentials and multifactor authentication (MFA) tokens. Active since June 2024, FlowerStorm operates by redirecting victims to fake login portals designed to resemble well-known cloud and SaaS services. The phishing links, distributed via Telegram, use unique URLs to capture sensitive information. Once stolen, credentials and MFA tokens are sent to attacker-controlled servers, enabling unauthorized access to the victims' accounts. The campaign has primarily affected organizations in North America and Europe, with the United States experiencing the highest impact. The campaign utilizes advanced techniques, including PHP-based backend communication and session tracking through JWT tokens. Exfiltrated data is sent to a "next.php" file hosted on either the same domain or an associated backend server. FlowerStorm's operations share similarities with the Rockstar2FA phishing kit, including comparable HTML structures, Cloudflare turnstile keys, and backend communication mechanisms. Notably, the cessation of Rockstar2FA's activities in November 2024 coincided with a surge in FlowerStorm campaigns, suggesting attackers may have shifted their tactics or adopted a new platform. To mitigate these threats, organizations should implement comprehensive security measures such as regular user awareness training, proactive phishing detection tools, and endpoint monitoring. Enforcing robust MFA policies, auditing systems for vulnerabilities, and monitoring for unusual account activity are crucial steps to strengthen security. Additionally, timely updates to security protocols and collaboration with cybersecurity providers and law enforcement can help counteract these sophisticated phishing campaigns.