Close Menu
    Main Menu
    • Home
    • News
    • Tech
    • Robotics
    • ML & Research
    • AI
    • Digital Transformation
    • AI Ethics & Regulation
    • Thought Leadership in AI

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    The three Invisible Dangers Each LLM App Faces (And The right way to Guard Towards Them)

    March 5, 2026

    Constructing Safe Bridges Between Decentralized Protocols and Company Treasury

    March 5, 2026

    Iran conflict: Is the US utilizing AI fashions like Claude and ChatGPT in fight?

    March 5, 2026
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Home»AI Ethics & Regulation»PoisonSeed Tricking Customers Into Bypassing FIDO Keys With QR Codes
    AI Ethics & Regulation

    PoisonSeed Tricking Customers Into Bypassing FIDO Keys With QR Codes

    Declan MurphyBy Declan MurphyJuly 19, 2025No Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    PoisonSeed Tricking Customers Into Bypassing FIDO Keys With QR Codes
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    Safety researchers at Expel have detailed a brand new phishing approach that sidesteps the safety supplied by bodily FIDO (Quick Id On-line) safety keys. Whereas the keys themselves stay uncompromised, attackers have found out how one can trick customers into granting entry by misusing a reputable cross-device login function.

    The attackers didn’t want to interrupt the FIDO safety key itself. As a substitute, they relied on social engineering to get round it. They took benefit of the cross-device sign-in function, which is supposed to make FIDO extra user-friendly, and used it towards the sufferer.

    QR Code and Phishing Web page

    It begins with the consumer visiting a pretend login web page and coming into their credentials. The attacker makes use of these particulars to start out an actual login on the precise website, which then shows a QR code. The consumer sees that code and scans it with their MFA app, not realising they’ve simply authorized the attacker’s login.

    The marketing campaign was noticed throughout a phishing assault towards an Expel buyer. Victims had been lured to a pretend Okta login web page that mimicked the corporate’s reputable portal. As soon as customers entered their credentials, the phishing website handed them to the true login system and requested a cross-device sign-in.

    That system then displayed a QR code, which the phishing website captured and confirmed to the consumer. When scanned utilizing their cell MFA app, the consumer unknowingly authorized the attacker’s session.

    This method bypasses the necessity for bodily interplay with the FIDO key, which might usually be required to finish the login. It additionally exhibits how attackers proceed to search out new methods to work round even essentially the most safe authentication programs, not by hacking the tech itself, however by exploiting the folks utilizing it.

    PoisonSeed

    In accordance with Expel’s report shared with Hackread.com, the corporate suspects the group behind the assault is PoisonSeed, a identified risk actor linked to phishing campaigns and cryptocurrency theft. Though the purpose on this case was seemingly account entry, the identical approach could possibly be utilized to different sorts of phishing or knowledge theft.

    Expel additionally referenced a second incident the place attackers used phishing to reset a consumer’s password after which registered their very own FIDO key to the account. Not like the QR code method, this one didn’t depend on tricking the consumer additional after the preliminary compromise. It was a direct takeover.

    Assault stream (By way of Expel)

    So what may be completed? Expel recommends carefully reviewing authentication logs for uncommon exercise, like logins from surprising areas or speedy registration of a number of FIDO keys. Limiting geographic sign-in permissions and requiring Bluetooth proximity for cross-device authentication are additionally efficient steps to cut back threat.

    J Stephen Kowski, Discipline CTO at SlashNext, weighed in by stating that this isn’t a glitch within the system, it’s a deliberate misuse of a function. “The approach is intelligent as a result of it exploits the reputable cross-device sign-in function that makes FIDO keys extra user-friendly,” he stated, including that attackers are actually working round robust authentication somewhat than attempting to interrupt it.



    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Declan Murphy
    • Website

    Related Posts

    Constructing Safe Bridges Between Decentralized Protocols and Company Treasury

    March 5, 2026

    149 Hacktivist DDoS Assaults Hit 110 Organizations in 16 International locations After Center East Battle

    March 5, 2026

    CISA Warns Qualcomm Chipsets Reminiscence Corruption Vulnerability Is Actively Exploited in Assaults

    March 4, 2026
    Top Posts

    The three Invisible Dangers Each LLM App Faces (And The right way to Guard Towards Them)

    March 5, 2026

    Evaluating the Finest AI Video Mills for Social Media

    April 18, 2025

    Utilizing AI To Repair The Innovation Drawback: The Three Step Resolution

    April 18, 2025

    Midjourney V7: Quicker, smarter, extra reasonable

    April 18, 2025
    Don't Miss

    The three Invisible Dangers Each LLM App Faces (And The right way to Guard Towards Them)

    By Yasmin BhattiMarch 5, 2026

    On this article, you’ll study why giant language mannequin purposes face three hidden safety dangers…

    Constructing Safe Bridges Between Decentralized Protocols and Company Treasury

    March 5, 2026

    Iran conflict: Is the US utilizing AI fashions like Claude and ChatGPT in fight?

    March 5, 2026

    Genuine Management from Tina Freese Decker, CEO of Corewell Well being

    March 5, 2026
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    UK Tech Insider
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms Of Service
    • Our Authors
    © 2026 UK Tech Insider. All rights reserved by UK Tech Insider.

    Type above and press Enter to search. Press Esc to cancel.