Critical Fortinet Vulnerability in FortiCloud SSO Authentication Bypass
FortiCloud Single Sign-On (SSO)
Continue ReadingFortiCloud Single Sign-On (SSO)
Continue ReadingSecurity Advisory
Security researchers from Okta have uncovered a stealthy and sophisticated Phishing-as-a-Service (PhaaS) framework known as VoidProxy.
This has been used to hijack Microsoft, Google and even integrated SSO accounts protected by providers like Okta. Unlike traditional phishing kits, VoidProxy employs Adversary-in-the-Middle (AiTM) tactics to capture real-time credentials, MFA tokens and bypassing several standard authentication protections.
VoidProxy’s infrastructure leverages disposable domains, Cloudflare protections, dynamic DNS which all of mimicking as legitimate enterprise setups becoming extremely difficult to detect, analyze. The attackers are running phishing campaigns with little technical effort, enabling wide-scale compromises that lead to email compromise, fraud and data breaches.
Its attack chain is built to evade modern email security, identity defenses, and analysis tools by leveraging the following:
Once a user enters their credentials and MFA tokens, the session is hijacked via a reverse proxy server, allowing the attacker to immediately access the legitimate account.
Here are some shortened url links

Attack Flow
| Step | Description |
| 1. Delivery | Phishing emails are sent from compromised accounts on email delivery services (like Postmarkapp or Constant Contact) increasing trust and shortening URL services for bypassing spam filters. |
| 2. Redirecting & Filter | Clicking the phishing link redirects victims through several short URLs and presents a Cloudflare captcha to ensure human interaction. |
| 3. Phishing | Victims land on a fake Microsoft or Google login page using realistic subdomain patterns like “login.<phishing_domain>.<.com/.io>”. Additionally, integrated SSO accounts are redirected to additional fake SSO pages mimicking the login flows. |
| 4. AiTM Session Hijack | The backend proxy captures credentials, MFA tokens and session cookies, allowing attackers full account access. |
| 5. Exfiltration | Session cookies and credentials are routed to the attacker’s admin panel in real-time. Integration with bots or webhooks enables instant alerts to the attackers. |
Why It’s Effective
AiTM Infrastructure: Unlike static phishing kits, VoidProxy runs a live proxy in the middle of the authentication flow, stealing session tokens or mfa token immediately after login.
CAPTCHA & Cloudflare Layers: These challenges ensure only real human victims reach the phishing payload, filtering out scanners and sandboxes.
Integrated SSO Targeting: Accounts using Okta or other SSO providers are redirected to accurate second-stage phishing pages, increasing the likelihood of a full compromise.
Recommendations:
Here are some recommendations below
Conclusion
VoidProxy’s layered architecture, real-time session hijacking and deep evasion mechanisms make it a potential threat even for environments with multi-factor authentication in place. We require a shift from traditional phishing detection toward real-time risk-based access controls, strong authenticators and persistent user education.
References:
Recent Comments