> Back to All Posts

Salty2FA Phishing Kit Targets Enterprises With MFA Bypass

Salty2FA

The Salty2FA phishing kit has quickly gained attention as one of the most dangerous phishing tools of 2025. Unlike older phishing kits that only capture usernames and passwords, this service also bypasses multiple forms of multi-factor authentication (MFA). That ability makes stolen credentials far more valuable and leaves enterprises exposed to full-scale account takeovers.

What Makes Salty2FA Different?

Salty2FA is a Phishing-as-a-Service (PhaaS) toolkit available to threat actors who pay for access. It offers a turnkey solution that streamlines credential harvesting while evading modern defenses. Key features include:

  • Multi-channel MFA bypass – Captures codes from SMS, push notifications, and even voice calls.
  • Cloudflare Turnstile integration – Shields malicious sites from automated scans and sandboxing.
  • Rotating infrastructure – Uses fast-changing domains to avoid blacklisting and takedowns.
  • Polished login pages – Replicates Microsoft 365 and other enterprise logins with high accuracy.

These upgrades make Salty2FA more convincing than traditional phishing kits and harder for defenders to block.

How Attacks Unfold

A typical Salty2FA campaign follows a multi-step process:

  • Phishing email delivery – Victims receive carefully crafted lures, often imitating corporate IT messages.
  • Redirection – Cloudflare Turnstile filters out automated crawlers before victims see the fake login.
  • Credential entry – Users enter valid usernames and passwords into the cloned portal.
  • MFA interception – The kit captures one-time passcodes in real time.
  • Account takeover – Attackers gain full access to enterprise accounts, often within minutes.

Because the kit validates inputs on the spot, attackers can bypass MFA while the victim is still engaged with the fake portal.

Global Targeting

Researchers believe Salty2FA activity began in March 2025, with more aggressive campaigns detected from July 2025 onwards. Early activity centered in the United States and Europe, but evidence shows expansion into Canada, India, and Latin America.

Industries identified as targets include:

  • Financial services
  • Energy and utilities
  • Telecommunications
  • Healthcare providers
  • Logistics and supply chain

The diversity of these sectors suggests the kit is attractive to both cybercriminal gangs and nation-aligned threat groups.

Links to Threat Actors

Some infrastructure overlaps connect Salty2FA campaigns to Storm-1575 and Storm-1747, two groups with histories of credential theft. While the kit is not directly confirmed as their creation, researchers caution that experienced operators may already be using it. This highlights how phishing has evolved into a professionalized ecosystem where services are shared, rented, or sold among multiple groups.

Why Enterprises Should Care

The Salty2FA phishing kit represents a significant escalation in phishing techniques. Multi-factor authentication was once considered a strong defense, but attackers are now undermining it with real-time interception. For enterprises, the consequences include:

Compromised Microsoft 365 accounts leading to email and data theft.

  • Privilege escalation if administrators are targeted.
  • Ransomware deployment following initial compromise.
  • Financial fraud using hijacked email accounts.
  • Defending against this level of threat requires more than basic MFA. Security experts recommend:
  • Moving toward hardware-based authentication like FIDO2 security keys.
  • Deploying behavioral analytics to flag suspicious logins.
  • Training employees with realistic phishing simulations.
  • Implementing strict domain filtering to reduce exposure to malicious links.

Final Thoughts

The Salty2FA phishing kit shows how cybercriminals are closing the gap with enterprise defenses. By bypassing SMS, push, and voice MFA codes, it transforms phishing from a nuisance into a major breach enabler. Enterprises that still rely on outdated MFA methods must adapt quickly. Stronger authentication, improved detection, and targeted training are now essential. Salty2FA is not just another phishing kit—it is a sign of where the threat landscape is headed.

 

Janet Andersen

Janet is an experienced content creator with a strong focus on cybersecurity and online privacy. With extensive experience in the field, she’s passionate about crafting in-depth reviews and guides that help readers make informed decisions about digital security tools. When she’s not managing the site, she loves staying on top of the latest trends in the digital world.