Salty2FA Used in Targeted Attacks on Enterprise Accounts

Hold the salt.
Lily Morris
Contributing Writer
Table salt in a wooden bowl

A phishing kit known as Salty2FA is now being used in active campaigns to steal login credentials and multi-factor authentication (MFA) codes.

Identified through sandbox-based malware analysis, this phishing-as-a-service tool has already been linked to attacks across North America and Europe. Targeted sectors include finance, telecom, energy, healthcare, and manufacturing.

Attacks often begin with a short, urgency-driven email related to payments or account issues. The message contains a link to a fake Microsoft login page that closely mimics the real one. When users enter their credentials and MFA code, the information is sent directly to the attacker.

The process happens quickly enough that the stolen code can still be used before it expires.

Why It Matters: Multi-factor authentication is designed to stop unauthorized access even when passwords are compromised. Salty2FA breaks that model by collecting second-factor codes during the login attempt. The phishing happens in real time and relies on tricking users. Defenses based only on URLs, domains, or file hashes are unlikely to catch it. Detecting behavior is more reliable than tracking infrastructure.

  • Campaigns Span Countries and Industries and Continue to Grow: Salty2FA has been linked to phishing campaigns across the US, UK, Germany, Spain, Italy, Greece, and Switzerland. These are not isolated events. The attacks repeat familiar patterns with minor adjustments depending on region or target. Affected organizations include banks, energy providers, healthcare systems, manufacturers, logistics firms, and schools. In some cases, attackers appear to move through smaller vendors to reach larger enterprise networks.
  • Fake Login Pages Mimic Trusted Enterprise Tools: The phishing portals are modeled after Microsoft login screens. Icons, layouts, and redirects match what users expect. These pages often use Cloudflare and other legitimate infrastructure to avoid detection. For enterprise employees moving quickly, the pages appear routine and trustworthy.
  • Account Access Often Takes Only One Click: In one confirmed case, a user received an email labeled “2025 Payment Correction” from a familiar contact. The link opened a fake Microsoft 365 login. After entering credentials and a 2FA code, attackers gained access within minutes. No malware was involved. The attack relied entirely on a convincing interface and quick user action.
  • Static Indicators Offer Limited Protection: Salty2FA frequently rotates its domains and hosting. Defenses that rely on fixed indicators like URLs or hashes are likely to miss it. What stays consistent is the attack pattern. It starts with a business-themed message, moves to a fake login, and ends with real-time capture of credentials and 2FA. Security tools that focus on behavior are more likely to detect it early.
  • MFA is the Target, Not a Backup: This kit is designed to collect MFA codes as part of the phishing process. After credentials are entered, users are prompted for whatever second factor is required, including push notifications, text codes, or voice responses. The attacker captures the code and logs in before it expires. Many users approve prompts without thinking, especially if they believe the request is from their own login attempt.

Go Deeper -> Watch Out for Salty2FA: New Phishing Kit Targeting US and EU Enterprises – The Hacker News

Trusted insights for technology leaders

Our readers are CIOs, CTOs, and senior IT executives who rely on The National CIO Review for smart, curated takes on the trends shaping the enterprise, from GenAI to cybersecurity and beyond.

Subscribe to our 4x a week newsletter to keep up with the insights that matter.

☀️ Subscribe to the Early Morning Byte! Begin your day informed, engaged, and ready to lead with the latest in technology news and thought leadership.

☀️ Your latest edition of the Early Morning Byte is here! Kickstart your day informed, engaged, and ready to lead with the latest in technology news and thought leadership.

ADVERTISEMENT

×
You have free article(s) left this month courtesy of the CIO Professional Network.

Enter your username and password to access premium features.

Don’t have an account? Join the community.

Would You Like To Save Articles?

Enter your username and password to access premium features.

Don’t have an account? Join the community.

Thanks for subscribing!

We’re excited to have you on board. Stay tuned for the latest technology news delivered straight to your inbox.

Save My Spot For TNCR LIVE!

Thursday April 18th

9 AM Pacific / 11 PM Central / 12 PM Eastern

Register for Unlimited Access

Already a member?

Digital Monthly

$12.00/ month

Billed Monthly

Digital Annual

$10.00/ month

Billed Annually

Would You Like To Save Books?

Enter your username and password to access premium features.

Don’t have an account? Join the community.

Log In To Access Premium Features

Sign Up For A Free Account

Name
Newsletters