Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Cyber Offensive Fundamentals 320x200 V0.1
Crowdstriker 970×120
PoisonSeed: How Phishing Attacks Bypass FIDO with WebAuthn

PoisonSeed: How Phishing Attacks Bypass FIDO with WebAuthn

5 August 2025 07:43

The authors of the PoisonSeedphishing campaign have found a way to bypass FIDO (in this case, FIDO2 with WebAuthn) using the cross-device authentication mechanism implemented in WebAuthn. The attackers convince victims to approve login requests from fake corporate portals. Please note that the PoisonSeed campaign is based on phishing, the ultimate goal of which is financial fraud. In the past, attackers have hacked corporate accounts for email marketing purposes and sent users letters containing pre-set seed phrases for cryptocurrency wallets.

In the new attacks identified by Expel experts, attackers are not exploiting a vulnerability in FIDO mechanisms, but are abusing a legitimate cross-device authentication feature. This WebAuthn feature allows a user to authenticate on one device using a security key or authentication app on another. Instead of physically connecting the key (for example, via USB), the authentication request is transmitted via Bluetooth or a QR code.

The new PoisonSeed attacks begin by redirecting the victim to a phishing site that imitates an Okta or Microsoft 365 corporate login portal. Once the victim enters their credentials, the phishing infrastructure uses them in real time to access the real portal. Typically, the victim would confirm access using their FIDO key. However, in this scheme, the phishing server initiates the login via another device’s login mechanism. As a result, the real portal generates a QR code, which is transmitted to the phishing page and displayed to the victim.

When a user scans this QR code with their smartphone or an authenticator app, they are essentially approving the attacker’s login. This allows them to bypass FIDO security by switching to device-to-device authentication, which does not require a physical key connection and can be approved remotely.

The researchers emphasize that the attack does not exploit any vulnerability in FIDO. Rather, the attackers exploit a standard function that allows them to lower the level of protection. To protect against such attacks, experts recommend:

  • Limit the geographic areas from which access is permitted and implement a registration process for employees traveling for business;
  • Regularly check for new FIDO key registrations from unusual geographic locations or from little-known manufacturers;
  • If possible, ask employees to use Bluetooth for authentication between devices, which reduces the risk of remote attacks.

Also in their report, Expel analysts describe another incident in which the attacker registered their FIDO key after compromising the victim’s account (presumably via phishing). In this case, there was no need to even forge a QR code or interact with the victim: the attacker completed the entire login process.

This case highlights that even phishing-resistant authentication methods can be bypassed if the user is persuaded to complete the login process without physically interacting with the key.

Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.

Cropped RHC 3d Transp2 1766828557 300x300
The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.