← All briefs
high September 21, 2025

Uncloaking VoidProxy: a Novel and Evasive Phishing-as-a-Service Framework

Source report →

VoidProxy is a recently uncovered Phishing-as-a-Service (PhaaS) framework that uses Adversary-in-the-Middle (AitM) techniques to intercept full authentication flows, including credentials, MFA codes, and session tokens. It targets Microsoft and Google accounts, and can handle cases where those accounts are federated via third-party identity providers like Okta. That means not only non-federated users are at risk; federated login flows (e.g. SP-initiated or IdP-initiated via Okta) are vulnerable. VoidProxy crafts second-stage landing pages after credential collection based on how the affected account is configured.

What makes VoidProxy especially evasive are its layered anti-analysis and infrastructure obfuscation techniques. Among these are: delivery via compromised legitimate ESP (Email Service Provider) accounts to improve sender reputation; embedding phishing links in URL shorteners and chaining multiple redirects to first-stage landing pages; use of low reputation, cheap TLDs (e.g. .icu, .xyz, .top etc.) for throw-away front-end domains; Cloudflare protection (CAPTCHA, use of Cloudflare Workers) to filter out non-human traffic and hide real server IPs; dynamic DNS wildcard services (e.g. services that resolve hostnames with embedded IPs) for backend proxy engines; and a “disposable frontend / resilient backend” architecture, indicating a semi-automated provisioning model for people who “rent” access to VoidProxy campaigns.

IP ADDRESS 2
166.88.114.203
192.9.246.161
DOMAIN 13
accounts.mzvyci.icu
accounts.nfutdb.icu
accounts.oyswkt.cfd
newnewdomnewcgbdhghjhi.prophfrot.top
newnewdomnewebjjfjegfd.eeocl.com
newnewdomnewdihbddahf.access-point.icu
securedauthxxccbgchgfj.xhfwez.icu
securedauthxxdcigbjdddj.losozr.icu
securedauthxxeafihgjdhb.dcohcv.icu
voidproxy.8da1ae5af7f283.166.88.114.203.sslip.io
voidproxy.d615123c2192ee.198.23.197.163.sslip.io
voidproxy.c2d56d07339c96.c09f63a1.nip.io
voidproxy.672d6b84579b84.c21ac039.nip.io
Library detections (2)
  • Suspicious Use of an Okta Session Cookie
  • FastPass Authentication Attempt via AiTM Phishing Proxy
Additional detection ideas (5)
  • Detect phishing attempts via email link analysis and sender reputation scoring
  • Monitor for user-initiated execution of untrusted content from email or web downloads
  • Detect extraction of web session cookies from browser processes or profile directories
  • Flag heavily obfuscated scripts or binaries with high entropy content
  • Detect rapid MFA push notification generation — high-frequency prompts indicate push bombing attacks