The Cybersecurity and Infrastructure Security Agency (CISA) and the FBI have released a joint cybersecurity advisory to warn of ShadowProxy, a potent Phishing-as-a-Service (PhaaS) platform. This service, sold via subscription on dark web forums, dramatically lowers the barrier to entry for sophisticated credential theft by providing all the necessary tools and infrastructure. ShadowProxy's most dangerous feature is its ability to defeat many common forms of multi-factor authentication (MFA). It achieves this by using an adversary-in-the-middle (AiTM) reverse proxy technique. This method allows the platform to intercept not just usernames and passwords, but also the valuable session cookie generated after a legitimate user successfully authenticates with their second factor. By stealing this cookie, attackers can bypass MFA entirely and hijack the user's authenticated session, gaining access to critical services like Microsoft 365 and Google Workspace.
The ShadowProxy platform automates the complex AiTM attack flow:
T1566.002 - Spearphishing Link)login.microsoftonline.com) and presents the real page back to the victim. The victim sees the legitimate login page and URL (though the initial domain is the attacker's).T1539 - Steal Web Session Cookie)This technique effectively bypasses MFA methods that are code or push-based, as the attacker is hijacking the final, authenticated session itself.
The CISA advisory contains technical details and TTPs, but specific IOCs like domains and IPs used by ShadowProxy were not listed in the summary articles.
Detecting AiTM phishing requires looking for subtle clues and network-level indicators.
url_patternlogin-microsft.com instead of login.microsoft.com).log_sourceothercertificate_subjectDetection:
Response:
The key to defeating AiTM attacks is to use MFA that is resistant to proxying.
The key mitigation is to upgrade from standard MFA to phishing-resistant MFA like FIDO2/WebAuthn, which is not vulnerable to AiTM attacks.
Train users to always verify the domain in the address bar before entering credentials.
Use Conditional Access Policies to require logins to originate from trusted and compliant devices, making stolen session cookies less useful.
The CISA advisory on ShadowProxy makes it clear that not all MFA is created equal. To counter this AiTM threat, organizations must evolve their MFA strategy. The specific implementation of this D3FEND technique must be phishing-resistant. This means moving away from OTP codes (SMS, email, authenticator app) and push notifications, as these are all vulnerable to proxying. The required implementation is FIDO2/WebAuthn. By requiring employees to use a hardware security key (like a YubiKey) or a platform authenticator (like Windows Hello), the cryptographic challenge-response is tied directly to the origin domain and the user's device. The ShadowProxy server, being on a different domain, cannot complete this authentication. This is the single most effective technical control to defeat this class of attack.
For detecting a successful ShadowProxy compromise, Web Session Activity Analysis is critical. Security teams must configure their SIEM to correlate Azure AD/Entra ID sign-in logs with subsequent activity logs. A key pattern to hunt for is a successful MFA authentication from a user's known location, followed almost immediately by session activity from a completely different and anomalous IP address, ASN, or country. This 'impossible travel' scenario within the same session is a strong indicator that the session cookie has been stolen and is being used by the attacker. Tools like Microsoft Sentinel and the advanced risk detection capabilities in Entra ID are designed to detect this, but they must be enabled, monitored, and acted upon.
CISA and the FBI issue a joint advisory warning about the ShadowProxy PhaaS platform.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats