
Introduction
The PhaaS ecosystem is maturing at alarming speed. One of the newest entrants is VoidProxy, a Phishing-as-a-Service platform offering turnkey kits for adversary-in-the-middle (AitM) phishing.
Unlike traditional phishing, VoidProxy captures:
- Credentials
- MFA codes
- Session cookies/tokens
…allowing attackers to bypass 2FA and hijack federated SSO accounts at scale.
Attack Flow Breakdown
- Email Delivery
- Sent via compromised ESPs (Constant Contact, Active Campaign).
- Avoids spam filters using legitimate infra.
- Redirect Chains
- Victim clicks → TinyURL / Bitly → disposable domains (
.icu,.top,.xyz).
- Victim clicks → TinyURL / Bitly → disposable domains (
- Evasion Layers
- Cloudflare CAPTCHA + Workers to filter out bots/sandboxes.
- Dynamic DNS (nip.io, sslip.io) for ephemeral infra.
- Phishing Page Impersonation
- Mimics Microsoft/Google login perfectly.
- Supports Okta + SSO federated logins.
- AitM Proxy
- Credentials + MFA relayed in real time.
- Attacker captures valid session cookies → instant access.
Impact & Risks
- MFA Bypass: Even OTP-protected accounts get compromised.
- SSO Hijack: Compromises federated corporate accounts.
- BEC & Fraud: Enables wire fraud, impersonation, data exfiltration.
- Stealth: Hard to detect due to session token theft.
Indicators of Compromise
- Emails from legitimate ESPs but suspicious sender names.
- Redirector URLs → disposable TLDs.
- Cloudflare CAPTCHA before login page.
- Login attempts with fresh session tokens from unknown IPs.
CyberDudeBivash Recommendations
- Phishing-Resistant MFA
- Enforce FIDO2, WebAuthn, Passkeys.
- Phase out SMS/OTP.
- Conditional Access
- Restrict logins to managed devices / VPNs.
- Enforce step-up authentication on anomalies.
- Session Security
- Short-lived tokens, device binding.
- Automatic token revocation on compromise.
- Monitoring
- Hunt for Cloudflare CAPTCHA → phishing red flag.
- Alert on redirector + low reputation TLDs.
- User Awareness
- Train to detect subtle login page anomalies.
- Encourage verifying URLs before login.
Highlighted Keywords
- Phishing-as-a-Service (PhaaS) detection
- MFA bypass protection solutions
- Identity Access Management (IAM) defense
- Cloud security posture management
- Zero Trust access enforcement
- Business Email Compromise (BEC) defense
- Threat intelligence & response services
Conclusion
VoidProxy is proof that phishing has industrialized.
- Easy-to-use PhaaS kit.
- AitM MFA bypass at scale.
- Federated login hijacks.
CyberDudeBivash recommends phishing-resistant MFA, conditional access, token hardening, and threat hunting to combat VoidProxy-style AitM phishing.
CyberDudeBivash Branding & CTA
Author: CyberDudeBivash
Powered by: CyberDudeBivash
cyberdudebivash.com | cyberbivash.blogspot.com
Contact: iambivash@cyberdudebivash.com
Download CyberDudeBivash Threat Intel Playbooks & Defense Apps: CyberDudeBivash Apps
#CyberDudeBivash #VoidProxy #PhaaS #Phishing #MFABypass #ThreatIntel #ZeroTrust #IdentitySecurity #BEC
Leave a comment