top of page

EvilProxy “phishing-as-a-service” kit capable of bypassing MFA emerges in dark web

A new phishing-as-a-service (PhaaS) toolkit dubbed EvilProxy is being advertised on the dark web as a tool for threat actors to bypass multi-factor authentication (MFA) protections employed against common online services including Apple, Google, Facebook, Microsoft, Twitter, GitHub and GoDaddy.

The service uses reverse proxy and cookie-injection methods to bypass MFA. Reverse proxies are servers that sit between the targeted victim and a legitimate authentication endpoint.

Once a victim is lured into clicking on a phishing page, the reverse proxy is able to display the legitimate login from the organisation’s website.

Then, when the victim enters their credentials and MFA code, they are forwarded to the platform’s server where the user is logged in and a session cookie is returned.

As the threat actor’s proxy sits in the middle, they are able to steal this session cookie which can be used to bypass configured multi-factor authentication protections, allowing them to log into the site.

EvilProxy is advertised on the dark web and underground forums as a subscription-based plan, wherein threat actors can choose a target of interest and activate the PhaaS kit for a specific period of time.

The reverse proxy technique has previously been attributed to more sophisticated groups and advanced persistent threats (APTs).

However, the successful development of the toolkit will enable low-skill threat actors who wouldn’t typically have the capability to set up reverse proxies to steal online accounts that are otherwise well-protected.

EvilProxy provides a cost-effective, automated, and scalable solution to unskilled threat actors to perform advanced phishing attacks and easily steal valuable accounts.

It’s highly likely that further phishing kits with varying techniques will continue to be developed in the coming weeks, months, and years.

Organisations should implement a multi-layered approach when protecting against phishing. Further technical guidance can be found at the official NCSC report.



Report all Fraud and Cybercrime to Action Fraud by calling 0300 123 2040 or online. Forward suspicious emails to Report SMS scams by forwarding the original message to 7726 (spells SPAM on the keypad).



The contents of blog posts on this website are provided for general information only and are not intended to replace specific professional advice relevant to your situation. The intention of East Midlands Cyber Resilience Centre (EMCRC) is to encourage cyber resilience by raising issues and disseminating information on the experiences and initiatives of others. Articles on the website cannot by their nature be comprehensive and may not reflect most recent legislation, practice, or application to your circumstances. EMCRC provides affordable services and Trusted Partners if you need specific support. For specific questions please contact us by email.


EMCRC does not accept any responsibility for any loss which may arise from reliance on information or materials published on this blog. EMCRC is not responsible for the content of external internet sites that link to this site or which are linked from it.

bottom of page