WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Posts Threat Awareness – Defending Against EvilProxy Phishing Toolkit
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Community Partnerships
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Threat Awareness – Defending Against EvilProxy Phishing Toolkit

Author: Alec Davison

Created: Tuesday, July 11, 2023 - 19:08

Categories: Cybersecurity

Despite growing awareness of the threat from phishing emails and greater adoption of multifactor authentication (MFA), threat actors are still successfully compromising firms via phishing attacks and breaching MFA protections with phishing toolkits. To help bring greater awareness to this activity, Proofpoint recently published a blog detailing how network defenders can help mitigate this threat.

During a recent assessment, researchers at Proofpoint detected the use of the EvilProxy phishing toolkit where the existing email security program failed to detect the activity. EvilProxy is a reverse-proxy Phishing-as-a-Service (PaaS) toolkit which allows low-skill threat actors to steal user credentials and authentication tokens to bypass MFA. According to Proofpoint, the observed attack started with an email that appeared to be a legitimate DocuSign notice that was requesting a signature. When the victim clicked on the embedded URL, they were taken to their organization’s Microsoft login page. However, the attacker had a proxy set up so when the user entered the login information, EvilProxy captured their credentials and authentication session token, thus allowing the attacker to log in as the user including the bypassing of the MFA protections. To defend against this activity, members should consider implementing email security solutions that use machine learning algorithms. Read more at Proofpoint.

Related Resources

Tip of the Week – May 14, 2026

May 14, 2026 in Cybersecurity, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 14, 2026)

May 14, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

(TLP:CLEAR) Non-Human Identities (NHIs) Are Growing Faster Than Most Security Programs

May 14, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar