CISA and FBI Issue Joint Advisory on 'ShadowProxy' Phishing-as-a-Service (PhaaS) Platform

CISA Warns of 'ShadowProxy' Phishing-as-a-Service that Bypasses MFA

HIGH
April 26, 2026
6m read
PhishingThreat IntelligenceSecurity Operations

Related Entities

Organizations

Products & Tech

Microsoft 365 Google Workspace

Other

ShadowProxy

Full Report

Executive Summary

The Cybersecurity and Infrastructure Security Agency (CISA) and the FBI have released a joint cybersecurity advisory to warn of ShadowProxy, a potent Phishing-as-a-Service (PhaaS) platform. This service, sold via subscription on dark web forums, dramatically lowers the barrier to entry for sophisticated credential theft by providing all the necessary tools and infrastructure. ShadowProxy's most dangerous feature is its ability to defeat many common forms of multi-factor authentication (MFA). It achieves this by using an adversary-in-the-middle (AiTM) reverse proxy technique. This method allows the platform to intercept not just usernames and passwords, but also the valuable session cookie generated after a legitimate user successfully authenticates with their second factor. By stealing this cookie, attackers can bypass MFA entirely and hijack the user's authenticated session, gaining access to critical services like Microsoft 365 and Google Workspace.


Threat Overview

  • Threat: ShadowProxy Phishing-as-a-Service (PhaaS) platform.
  • Mechanism: Adversary-in-the-Middle (AiTM) reverse proxy.
  • Objective: Credential and session cookie theft to bypass MFA.
  • Targets: Users of major cloud services, primarily Microsoft 365 and Google Workspace.
  • Accessibility: Sold as a subscription service, making advanced phishing capabilities available to a broad range of threat actors, regardless of their technical skill.
  • Impact: Full compromise of user accounts, leading to data breaches, business email compromise (BEC), and further internal network compromise.

Technical Analysis

The ShadowProxy platform automates the complex AiTM attack flow:

  1. Phishing Email: The attacker, using ShadowProxy's tools, sends a phishing email to a target. The email contains a link that points to the ShadowProxy reverse proxy server instead of the legitimate service. (T1566.002 - Spearphishing Link)
  2. Reverse Proxy: When the victim clicks the link, they are connected to the ShadowProxy server. This server forwards the victim's request to the real login page (e.g., login.microsoftonline.com) and presents the real page back to the victim. The victim sees the legitimate login page and URL (though the initial domain is the attacker's).
  3. Credential Interception: The victim enters their username and password. The ShadowProxy proxy intercepts these credentials as they are passed through to the real site.
  4. MFA Interception: The legitimate site, having received valid credentials, prompts for MFA (e.g., an SMS code, authenticator app number). This prompt is passed through the proxy to the victim. The victim enters their MFA code.
  5. Session Cookie Theft: The proxy forwards the MFA code to the legitimate site. The site validates it and, in response, sends back a session cookie to establish an authenticated session. This is the critical step. The ShadowProxy server intercepts this session cookie before it reaches the victim's browser.
  6. Account Takeover: The attacker now has the victim's username, password, and, most importantly, the session cookie. They can inject this cookie into their own browser to access the victim's account without needing to re-authenticate or provide MFA. (T1539 - Steal Web Session Cookie)

This technique effectively bypasses MFA methods that are code or push-based, as the attacker is hijacking the final, authenticated session itself.


Impact Assessment

  • MFA Becomes Ineffective: The primary impact is that it renders many common MFA implementations useless, eroding the security of what is considered a foundational control.
  • Widespread Account Compromise: Enables large-scale takeover of corporate email and cloud accounts.
  • Business Email Compromise (BEC): Attackers can use hijacked email accounts to launch convincing BEC attacks, such as fraudulent wire transfer requests.
  • Data Exfiltration: Full access to cloud accounts (Microsoft 365, Google Workspace) means attackers can steal vast amounts of sensitive data from email, SharePoint, OneDrive, etc.
  • Downstream Attacks: A compromised account is often used as a beachhead to launch further attacks within the organization's network.

IOCs — Directly from Articles

The CISA advisory contains technical details and TTPs, but specific IOCs like domains and IPs used by ShadowProxy were not listed in the summary articles.


Cyber Observables — Hunting Hints

Detecting AiTM phishing requires looking for subtle clues and network-level indicators.

Type
url_pattern
Value / Pattern
Typosquatted or lookalike domains in email links (e.g., login-microsft.com instead of login.microsoft.com).
Description
The initial phishing link cannot be the real domain.
Context
Email security gateway logs and user awareness.
Confidence
high
Type
log_source
Value / Pattern
Azure AD Sign-in Logs showing an authentication from an unexpected location or IP.
Description
A successful session hijacking will result in the attacker's IP accessing the account.
Context
Azure AD / Entra ID sign-in logs.
Confidence
high
Type
other
Value / Pattern
Mismatched session location and authentication location.
Description
A sign-in log may show authentication from a known location (the victim) but subsequent activity from an anomalous location (the attacker).
Context
SIEM correlation of sign-in logs.
Confidence
high
Type
certificate_subject
Value / Pattern
SSL certificates for phishing domains that try to mimic the target brand.
Description
Attackers use valid SSL certs to make their sites look legitimate.
Context
Certificate Transparency log monitoring.
Confidence
medium

Detection & Response

Detection:

  • Conditional Access Policies: Configure Azure AD/Entra ID Conditional Access to flag or block sign-ins where properties don't match (e.g., IP address, device compliance). A session starting from a non-compliant device after a successful MFA prompt is a huge red flag.
  • Log Analysis: Actively monitor sign-in logs for impossible travel scenarios, sign-ins from anonymous proxy services, and other anomalies. (D3-UGLPA: User Geolocation Logon Pattern Analysis)
  • Enhanced Email Filtering: Use email security solutions that can analyze links at time-of-click to detect redirects to phishing sites.

Response:

  • If a compromised session is detected, immediately initiate a 'sign-out all sessions' command for the affected user account.
  • Force a password reset for the user.
  • Investigate all activity performed by the attacker during the hijacked session.

Mitigation

The key to defeating AiTM attacks is to use MFA that is resistant to proxying.

  1. Phishing-Resistant MFA: This is the most critical mitigation. CISA and the FBI strongly recommend implementing phishing-resistant MFA. This ties the authentication challenge to the device the user is on, which cannot be proxied. Examples include:
    • FIDO2/WebAuthn: Using hardware security keys (e.g., YubiKey) or platform authenticators (e.g., Windows Hello, Face ID/Touch ID).
    • Certificate-Based Authentication: Smart cards or device-based certificates.
  2. User Training: Educate users to be suspicious of login pages where the URL is not the correct, legitimate domain. Train them to inspect the address bar before entering credentials.
  3. Conditional Access Policies: Implement strict Conditional Access Policies that require logins to come from trusted, compliant, and managed devices. This can prevent a stolen session cookie from being used on an attacker's machine.
  4. Limit Session Lifetimes: Configure shorter session lifetimes to reduce the window of opportunity for an attacker to use a stolen cookie.

Timeline of Events

1
April 26, 2026
CISA and the FBI issue a joint advisory warning about the ShadowProxy PhaaS platform.
2
April 26, 2026
This article was published

MITRE ATT&CK Mitigations

The key mitigation is to upgrade from standard MFA to phishing-resistant MFA like FIDO2/WebAuthn, which is not vulnerable to AiTM attacks.

Train users to always verify the domain in the address bar before entering credentials.

Use Conditional Access Policies to require logins to originate from trusted and compliant devices, making stolen session cookies less useful.

D3FEND Defensive Countermeasures

The CISA advisory on ShadowProxy makes it clear that not all MFA is created equal. To counter this AiTM threat, organizations must evolve their MFA strategy. The specific implementation of this D3FEND technique must be phishing-resistant. This means moving away from OTP codes (SMS, email, authenticator app) and push notifications, as these are all vulnerable to proxying. The required implementation is FIDO2/WebAuthn. By requiring employees to use a hardware security key (like a YubiKey) or a platform authenticator (like Windows Hello), the cryptographic challenge-response is tied directly to the origin domain and the user's device. The ShadowProxy server, being on a different domain, cannot complete this authentication. This is the single most effective technical control to defeat this class of attack.

For detecting a successful ShadowProxy compromise, Web Session Activity Analysis is critical. Security teams must configure their SIEM to correlate Azure AD/Entra ID sign-in logs with subsequent activity logs. A key pattern to hunt for is a successful MFA authentication from a user's known location, followed almost immediately by session activity from a completely different and anomalous IP address, ASN, or country. This 'impossible travel' scenario within the same session is a strong indicator that the session cookie has been stolen and is being used by the attacker. Tools like Microsoft Sentinel and the advanced risk detection capabilities in Entra ID are designed to detect this, but they must be enabled, monitored, and acted upon.

Timeline of Events

1
April 26, 2026

CISA and the FBI issue a joint advisory warning about the ShadowProxy PhaaS platform.

Sources & References

'ShadowProxy' Phishing Service Lets Anyone Bypass MFA
Krebs on Security (krebsonsecurity.com) April 26, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

ShadowProxyPhaaSPhishingMFAAiTMCISAFBISession Hijacking

📢 Share This Article

Help others stay informed about cybersecurity threats