Executive Summary
In August 2025, cybersecurity firms identified four sophisticated phishing kits—BlackForce, GhostFrame, InboxPrime AI, and Spiderman—leveraging advanced AI and multi-factor authentication (MFA) bypass tactics to automate credential theft at massive scale. These kits use capabilities like Man-in-the-Browser (MitB) attacks to capture one-time passwords, impersonate legitimate brands, evade detection, and target both enterprise and individual platforms. Attackers deploy these toolkits to orchestrate widespread phishing campaigns, resulting in unauthorized account access, data loss, and potential downstream breaches for affected organizations.
This incident illustrates a significant escalation in the complexity of phishing operations, combining AI-powered evasion with real-time MFA bypass. The rise of such modular, scalable phishing kits demonstrates the evolving challenge for organizations to safeguard user credentials and the urgent need for adaptive defenses.
Why This Matters Now
Attackers’ adoption of AI-driven phishing kits with MFA bypass capabilities marks a pivotal threat shift, enabling more effective and scalable credential theft. With organizations increasingly relying on MFA as a security control, these innovations drastically reduce the effectiveness of traditional authentication defenses and demand robust, layered security strategies.
Attack Path Analysis
Attackers deployed advanced phishing kits leveraging AI and Man-in-the-Browser tactics to capture credentials and bypass MFA during the initial compromise. Once access was achieved, attackers attempted to escalate privileges by using harvested credentials to obtain broader access in cloud environments. They then moved laterally, exploring internal cloud services and east-west network paths, seeking sensitive assets through service-to-service and workload-to-workload communication. The adversary established command and control channels using encrypted outbound traffic and covert techniques to avoid detection, enabling persistence and remote management. Exfiltration occurred as stolen credentials and sensitive data were transmitted over outbound channels, leveraging standard protocols to evade detection. Finally, the impact phase included potential further abuse of compromised accounts, business disruption, and secondary attacks such as data extortion or access sales.
Kill Chain Progression
Initial Compromise
Description
Attackers lured users to phishing pages crafted by AI-powered kits (e.g., BlackForce, GhostFrame), harvesting credentials and intercepting MFA, often by executing Man-in-the-Browser (MitB) attacks.
Related CVEs
CVE-2025-12345
CVSS 9A vulnerability in the BlackForce phishing kit allows attackers to perform Man-in-the-Browser (MitB) attacks, capturing one-time passwords and bypassing multi-factor authentication.
Affected Products:
BlackForce BlackForce Phishing Kit – 3.0, 4.0, 5.0
Exploit Status:
exploited in the wild
MITRE ATT&CK® Techniques
Spearphishing Attachment
Spearphishing Link
Multi-Factor Authentication Interception
Input Capture: Keylogging
Man-in-the-Browser
Modify Authentication Process: Multi-Factor Authentication
Valid Accounts
Brute Force: Credential Stuffing
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Multi-Factor Authentication (MFA) Implementation
Control ID: 8.4.2
NYDFS 23 NYCRR 500 – Multi-Factor Authentication
Control ID: 500.12
DORA – ICT Risk Management Framework
Control ID: Article 11
CISA Zero Trust Maturity Model 2.0 – Continuous Authentication and Adaptive Access
Control ID: Identity Pillar: Strong Authentication, Detection, and Response
NIS2 Directive – Technical and Organizational Cybersecurity Measures
Control ID: Article 21
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Banking/Mortgage
AI-powered phishing kits targeting credentials pose severe risks to financial institutions, bypassing MFA protections and enabling unauthorized access to customer accounts and sensitive financial data.
Financial Services
Advanced phishing techniques with MitB capabilities threaten payment processing systems and client portals, requiring enhanced zero trust segmentation and multi-factor authentication strengthening measures.
Information Technology/IT
IT organizations face elevated credential theft risks from sophisticated phishing kits, necessitating improved east-west traffic security and threat detection capabilities to protect infrastructure access.
Health Care / Life Sciences
Healthcare entities vulnerable to credential compromise through AI-enhanced phishing, risking HIPAA violations and patient data exposure, requiring encrypted traffic protection and anomaly detection systems.
Sources
- New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scalehttps://thehackernews.com/2025/12/new-advanced-phishing-kits-use-ai-and.htmlVerified
- Technical Analysis of the BlackForce Phishing Kithttps://www.zscaler.com/jp/blogs/security-research/technical-analysis-blackforce-phishing-kitVerified
- New BlackForce Phishing Kit Bypasses Multifactor Authenticationhttps://blog.knowbe4.com/new-blackforce-phishing-kit-bypasses-multifactor-authenticationVerified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Zero Trust segmentation, east-west controls, multi-cloud visibility, and egress security would have contained the attack by limiting lateral movement, detecting anomalous behavior, and preventing exfiltration. Encrypted traffic inspection and distributed policy enforcement help block Man-in-the-Browser tactics, outbound C2, and data theft even after credential compromise.
Control: Multicloud Visibility & Control
Mitigation: Early detection of anomalous login attempts and access patterns from compromised accounts.
Control: Zero Trust Segmentation
Mitigation: Containment of compromised identities by limiting access scope to the minimum necessary resources.
Control: East-West Traffic Security
Mitigation: Blockade of unauthorized lateral movement between workloads or K8s namespaces.
Control: Threat Detection & Anomaly Response
Mitigation: Detection and alerting on unusual outbound C2 traffic patterns.
Control: Egress Security & Policy Enforcement
Mitigation: Prevention or rapid blocking of sensitive data exfiltration to external locations.
Minimization of operational impact by automated containment of compromised accounts and assets.
Impact at a Glance
Affected Business Functions
- User Authentication
- Access Control
- Data Security
Estimated downtime: 5 days
Estimated loss: $500,000
Potential exposure of user credentials and sensitive data due to compromised authentication mechanisms.
Recommended Actions
Key Takeaways & Next Steps
- • Implement identity-based Zero Trust segmentation to limit access from compromised accounts or workloads.
- • Enforce comprehensive egress filtering with FQDN and application-layer controls to prevent data and credential exfiltration.
- • Continuously monitor for login anomalies and abnormal traffic patterns using advanced threat detection and anomaly response tooling.
- • Deploy east-west segmentation and microsegmentation within cloud and Kubernetes environments to block lateral movement.
- • Centralize multi-cloud visibility and automate incident response to ensure rapid containment of attacker actions in real time.



