Technology

New FlowerStorm Microsoft phishing service fills void left by Rockstar2FA

FlowerStorm Phishing

A new Microsoft 365 phishing-as-a-service platform called “FlowerStorm” is growing in popularity, filling the void left behind by the sudden shutdown of the Rockstar2FA cybercrime service.

First documented by Trustwave in late November 2024, Rockstar2FA operated as a PhaaS platform facilitating large-scale adversary-in-the-middle (AiTM) attacks targeting Microsoft 365 credentials.

The service offered advanced evasion mechanisms, a user-friendly panel, and numerous phishing options, selling cybercriminals access for $200/two weeks.

According to Sophos researchers Sean Gallagher and Mark Parsons, Rockstar2FA suffered from a partial infrastructure collapse on November 11, 2024, making many of the service’s pages unreachable.

Sophos says this does not appear to be the result of law enforcement action against the cybercrime platform but rather a technical failure.

A few weeks later, FlowerStorm, which first appeared online in June 2024, started quickly gaining traction.

Rockstar2FA detections
Rockstar2FA detections
Source: Sophos

A possible rebrand of Rockstar2FA?

Sophos has found that the new service, FlowerStorm PhaaS, shares many features previously seen in Rockstar2FA, so it is possible that operators rebranded under a new name to reduce exposure.

Sophos identified several similarities between Rockstar2FA and FlowerStorm, suggesting a shared ancestry or operational overlap:

  1. Both platforms use phishing portals mimicking legitimate login pages (e.g., Microsoft) to harvest credentials and MFA tokens, relying on backend servers hosted on domains like .ru and .com. Rockstar2FA used randomized PHP scripts, while FlowerStorm standardized with next.php.
  2. The HTML structure of their phishing pages is highly similar, featuring random text in comments, Cloudflare “turnstile” security features, and prompts like “Initializing browser security protocols.” Rockstar2FA used automotive themes, while FlowerStorm shifted to botanical themes, but the underlying design remains consistent.
  3. Credential harvesting methods align closely, using fields like email, pass, and session tracking tokens. Both platforms support email validation and MFA authentication through their backend systems.
  4. Domain registration and hosting patterns overlap significantly, with heavy use of .ru and .com domains and Cloudflare services. Their activity patterns showed synchronized rises and falls through late 2024, indicating potential coordination.
  5. The two platforms made operational mistakes that…

Click Here to Read the Full Original Article at BleepingComputer…