
RaccoonO365 Takedown: How a Sophisticated Phishing Ring Bypassed MFA
In a significant blow to the cybercrime ecosystem, a major Phishing-as-a-Service (PhaaS) platform known as RaccoonO365 has been dismantled through a collaborative effort between leading tech and security firms. This operation disrupts a service that made sophisticated, multi-factor authentication (MFA) bypassing attacks accessible to a wide range of malicious actors, posing a serious threat to organizations using Microsoft 365.
This development highlights the evolving nature of cyber threats and the critical importance of robust security measures that go beyond traditional authentication methods.
What Was RaccoonO365?
RaccoonO365 wasn’t just a single phishing kit; it was a full-fledged Phishing-as-a-Service (PhaaS) platform. This business model allows cybercriminals, even those with limited technical skills, to subscribe to and launch sophisticated phishing campaigns. For a monthly fee, attackers gained access to a toolkit designed specifically to target Microsoft 365 users with high-quality, deceptive login pages and an advanced attack framework.
The primary goal of RaccoonO365 was to steal login credentials and, more importantly, session cookies to hijack user accounts. This service was linked to numerous threat actors, including a group tracked as Storm-1190, which leveraged the platform for large-scale phishing operations.
The Dangerous Technique: Bypassing MFA with AiTM Attacks
The true danger of RaccoonO365 lay in its core technology. The platform employed a sophisticated Adversary-in-the-Middle (AiTM) technique. Here’s how it worked:
- A victim receives a phishing email with a link to a fraudulent but convincing Microsoft 365 login page.
- When the user clicks the link, they are directed to a proxy server controlled by the attacker. This server sits “in the middle” between the user and the legitimate Microsoft login service.
- The user enters their username and password on the fake page, which are captured by the attacker.
- The fake site then prompts the user for their MFA code (e.g., from an authenticator app or SMS).
- When the user enters the MFA code, it is passed through the attacker’s server to the real Microsoft service, which grants access.
Here’s where the attack became truly devastating: upon successful authentication, Microsoft generates a session cookie. This cookie is a small piece of data that keeps a user logged in without needing to re-enter their credentials every time. The AiTM server intercepts and steals this session cookie.
With the stolen session cookie, the attacker can bypass MFA entirely. They can simply replay the cookie in their own browser to gain full access to the victim’s account, including emails, files, and contacts.
The Impact: From Stolen Credentials to Financial Fraud
Once an account was compromised, attackers could launch a variety of devastating follow-on attacks. The stolen access was a gateway to:
- Business Email Compromise (BEC): Attackers would use the hijacked email account to impersonate employees and trick colleagues or partners into making fraudulent wire transfers.
- Data Exfiltration: Sensitive corporate data, intellectual property, and personal information stored in emails and OneDrive were prime targets for theft.
- Further Phishing Campaigns: The compromised account was often used as a launchpad to send more phishing emails to internal employees and external contacts, leveraging the trust associated with the legitimate email address.
A Coordinated Disruption
The takedown of RaccoonO365 was the result of a coordinated effort between Microsoft’s threat intelligence teams and Cloudflare. By analyzing the service’s infrastructure, security researchers were able to identify and disable the core domains and servers that powered the PhaaS platform.
This action has significantly disrupted the operations of cybercriminals who relied on RaccoonO365, forcing them to find alternative, and hopefully less effective, tools. It serves as a powerful example of how industry collaboration is essential in the ongoing fight against cybercrime.
How to Protect Your Organization from Advanced Phishing Threats
While this takedown is a victory for cybersecurity, the techniques used by RaccoonO365 are still a threat. Organizations must remain vigilant and implement layered security defenses.
- Implement Phishing-Resistant MFA: Not all MFA is created equal. Move away from SMS and authenticator app codes, which are vulnerable to AiTM attacks. Instead, adopt phishing-resistant MFA methods like FIDO2 security keys, Windows Hello for Business, or certificate-based authentication. These methods cryptographically bind the login process to the user’s device, making it nearly impossible for an AiTM proxy to intercept a valid session.
- Enhance User Education: Train employees to recognize the signs of a sophisticated phishing attack. Emphasize scrutinizing sender email addresses, hovering over links to verify the destination URL, and being wary of any unexpected requests for login credentials, even if they appear to come from a legitimate source.
- Utilize Advanced Threat Protection: Deploy security solutions that can automatically detect and block malicious links and attachments before they reach a user’s inbox. Services like Microsoft Defender for Office 365 and other advanced email security gateways are crucial for filtering these threats.
- Monitor for Suspicious Account Activity: Actively monitor for unusual login locations (impossible travel scenarios), unexpected inbox rule creation (a common tactic for attackers to hide their tracks), and unusual file access patterns.
The disruption of RaccoonO365 underscores a critical reality: as security measures like MFA become standard, attackers will continuously innovate to bypass them. A proactive and defense-in-depth security strategy is the only way to stay ahead of these evolving threats.
Source: https://securityaffairs.com/182294/cyber-crime/microsoft-and-cloudflare-teamed-up-to-dismantle-the-raccoono365-phishing-service.html


