Sneaky2FA Phishing Kit Adds Browser-in-the-Browser (BitB) to Steal Microsoft 365 Sessions

by | Nov 20, 2025 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

Overview

The Sneaky2FA phishing-as-a-service (PhaaS) platform has added a significant new capability to its Microsoft 365 credential-theft toolkit: browser-in-the-browser (BitB) fake login windows. This enhancement dramatically increases the realism of phishing attacks and enables attackers to steal both passwords and active authenticated sessions, even when multi-factor authentication (MFA) is enabled.

Push Security’s new analysis shows Sneaky2FA joining Tycoon2FA and Mamba2FA as the latest PhaaS service to adopt more advanced, MFA-bypassing social-engineering tactics.


What BitB Brings to Sneaky2FA

Sneaky2FA was already a sophisticated kit, known for:

  • SVG-based phishing pages
  • Attacker-in-the-middle (AitM) reverse proxying
  • Session-token theft, not just password capture

But the addition of BitB fake pop-ups brings a new level of visual deception to its attacks.

How BitB Works

Originally created as a concept by researcher mr.d0x in 2022, BitB creates a fake login window rendered inside the original browser page. It:

  • Mimics a standalone browser pop-up
  • Displays a fake URL bar showing the legitimate domain (e.g., login.microsoftonline.com)
  • Is styled to perfectly match the victim’s OS and browser (Edge on Windows, Safari on macOS)
  • Uses an iframe to host the malicious login form

Because the fake URL bar appears authentic, victims believe they’re entering credentials directly into the official Microsoft pop-up.

Deceptive prompt leading to phishingDeceptive prompt leading to phishing
Source: Push Security

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses



Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

Inside a Sneaky2FA Attack

The current attack chain involves:

  1. Victim receives a phishing link hosted on previewdoc[.]com.
  2. They pass a Cloudflare Turnstile bot check, increasing trust and evading automated scanners.
  3. They are prompted to “Sign in with Microsoft” to view a document.
  4. Clicking the sign-in button triggers the BitB fake login pop-up.
  5. Sneaky2FA loads its reverse-proxy Microsoft login flow inside the pop-up, stealing:
    • Microsoft 365 credentials
    • Active session tokens (bypassing MFA)
  6. Attackers authenticate immediately into the victim’s account.

BitB here is mainly a cosmetic layer that drastically improves the believability of Sneaky2FA’s AitM infrastructure.

The fake windowThe fake window
Source: Push Security


Stealth and Evasion Capabilities

Sneaky2FA’s phishing infrastructure is heavily optimized for evading browser protections, scanners, and security crawlers.

Push Security highlights several evasion techniques:

  • Conditional loading (bots and researchers get benign pages)
  • HTML/JS obfuscation, such as invisible characters inserted into UI text
  • Microsoft interface elements stored as encoded images, not text
  • Dynamic adaptation to OS, browser, and screen size
  • Session-based logic to avoid automated detection and fingerprinting

The pages are designed to be nearly undetectable by standard anti-phishing solutions.


How to Identify a Fake BitB Pop-Up

Because BitB pop-ups look extremely convincing, Push Security recommends two key detection methods:

Try dragging the window outside the parent browser

A real browser pop-up is a separate OS-level window.
A fake BitB pop-up cannot leave the bounds of the original page.

Check the taskbar

Real pop-up windows create a separate browser instance icon.
Fake BitB pop-ups do not.




Rising Trend: BitB in PhaaS Platforms

Sneaky2FA is not the first kit to adopt BitB.
Push Security notes widespread adoption across:

  • Raccoon0365 / Storm-2246 (recently dismantled by Microsoft & Cloudflare)
  • Tycoon2FA
  • Mamba2FA

All three target Microsoft 365 due to the high-value access it grants attackers.

The integration of BitB signals a broader shift in PhaaS services toward MFA-resistant phishing, leveraging reverse-proxying and realistic UI deception to compromise enterprise cloud accounts.

Are u a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]

Source: bleepingcomputer.com, pushsecurity.com/blog

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This