The listings featured on this site are from companies from which this site receives compensation and some are co-owned by our parent company. This influence: Rank and manner in which listings are presented.
Learn more
The How To Guide was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: Holiday.com, ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on The How To Guide are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.
Advertising Disclosure

The How To Guide was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: Holiday.com, ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on The How To Guide are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

100+ Organizations Affected by EvilProxy Phishing

100+ Organizations Affected by EvilProxy Phishing
Author Image Husain Parvez
Husain Parvez First published on August 13, 2023 Cybersecurity Researcher

Proofpoint Inc. has released a report highlighting the surge in the popularity of EvilProxy, particularly in its use for targeting Microsoft 365 accounts of top-level executives within prominent companies. Cybercriminals favor these kits due to their minimal requirement for technical expertise or programming skills, all while delivering effective outcomes.

This campaign has dispatched around 120,000 phishing emails to numerous organizations across the globe from March to June 2023. Of the several users who fell victim, almost 39% were identified as high-ranking executives, encompassing CEOs (9%) and CFOs (17%). The attacks have specifically targeted individuals with access to financial resources or confidential data.

Proofpoint experts reported that threat actors exploited "EvilProxy" to capture credentials safeguarded by multi-factor authentication (MFA) and session cookies. Over the past six months, these experts noticed a doubling in cloud account breaches impacting high-level executives at large companies using EvilProxy.

"Employee credentials are prized by threat actors — they can offer access to valuable or sensitive corporate information and user accounts," the Proofpoint team mentioned. "While stolen credentials offer a multitude of attack vectors for cybercriminals, not all credentials are created equal."

According to SC Media, these emails impersonate brands, utilizing third-party service offerings to deceive users into clicking on links infused with malware. When the phishing server mimics the genuine login form, it has the capability to capture authentication cookies as soon as a user accesses their account. Moreover, since the user has already cleared MFA challenges during login, the purloined cookie grants threat actors the ability to circumvent multi-factor authentication.

In September 2022, Resecurity highlighted that EvilProxy is available for purchase by cybercriminals at $400/month, touting the capability to target accounts on platforms such as Apple, Google, Facebook, Microsoft, Twitter, GitHub, GoDaddy, and PyPI.

About the Author

  • Author Image Husain Parvez
  • Husain Parvez Cybersecurity Researcher

Husain Parvez is a Cybersecurity Researcher and News Writer at The How To Guide, focusing on VPN reviews, detailed how-to guides, and hands-on tutorials. Husain is also a part of the The How To Guide Cybersecurity News bulletin and loves covering the latest events in cyberspace and data privacy.

Please, comment on how to improve this article. Your feedback matters!

Leave a comment

This field must contain more than 50 characters

The field content should not exceed 1000 letters

Sorry, links are not allowed in this field!

Name should contain at least 3 letters

The field content should not exceed 80 letters

Sorry, links are not allowed in this field!

Please enter a valid email address