Enterprises that protect user accounts through two-factor authentication (2FA) should take the additional step of defending against real-time phishing proxies, which enable criminals to bypass multi-factor authentication (MFA) measures and take over accounts. Fortunately, F5 BIG-IP Access Policy Manager (APM) customers have an easy option of adding F5 Distributed Cloud Bot Defense to effectively shut down these proxies.
A real-time phishing proxy attack begins with a phishing message delivered via text, email, or a web page. The phishing message contains a link taking the user to a domain controlled by the attacker that is designed to proxy all requests through to the target application. From the perspective of the user, everything looks legitimate, except the domain name, which is usually chosen to closely resemble the real one.
Fooled by the phishing proxy, the user enters their credentials. In the case of single factor authentication, this entry of credentials is sufficient for the attacker to gain access to the account. In the case of 2FA, the real-time phishing proxy sends the credentials to the legitimate application, triggering the 2FA request. Unfortunately, the user, still believing that they are engaging with the legitimate application, will likely go along with the 2FA, agreeing to whatever request is made.
Reverse phishing proxies can compromise nearly all forms of 2FA:
We should expect real-time phishing proxy attacks to rise because phishing proxies as a service (PhaaS)—such as EvilGinx, Muraena, and Modlishka—make it remarkably easy for criminals by providing everything they need to launch these attacks:
Traffic that passes through a phishing proxy has distinctive characteristics: The domain name will not match that of the real site, the HTML and JavaScript may be altered to accommodate the domain name change, and the timing and TLS signatures may be altered. Using many of the same client-side and network signals used to distinguish bots from humans, Distributed Cloud Bot Defense can detect the anomalies that distinguish real-time phishing proxies and thereby resolve one of the most common threats against MFA.
BIG-IP APM is a flexible, high-performance access management solution for apps and APIs. It provides authentication services to applications by connecting enterprise identity services, such as Active Directory, LDAP providers, and RADIUS, to modern authentication protocols, such as SSO, access federation, OAuth 2.0, SAML, and OIDC.
BIG-IP APM includes support for step-up authentication, providing SMS-based OTP 2FA out of the box. Moreover, BIG-IP APM integrates with most leading MFA solutions, including those from Cisco Duo, Okta, Azure AD, and others.
Because of the central role that BIG-IP APM plays in the authentication process of many enterprises, it is an ideal location to implement Distributed Cloud Bot Defense to protect users from real-time phishing proxy attacks that use automation to bypass MFA protections.
For more technical details, see the F5 DevCentral article on configuring Distributed Cloud Bot Defense within BIG-IP APM