• Archives
  • Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home Security

VoidProxy Targets Microsoft 365 & Google Accounts

Akinola Ajibola by Akinola Ajibola
September 15, 2025
in Security
Share on FacebookShare on Twitter

A dangerous new online scam called Voidproxy is making waves in the cybersecurity world, and it’s targeting some of the most popular services we use every day.  This phishing service is going after Microsoft 365 and Google accounts with alarming success, and what makes it particularly scary is how it can bypass even the strongest security measures.

The most concerning aspect of VoidProxy is that it can defeat multi-factor authentication, which is supposed to be one of our best defenses against hackers.

Security researchers first spotted attacks from VoidProxy starting in January 2025, but investigations revealed that criminals were advertising this service on the dark web marketplaces as early as August 2024. This means the people behind VoidProxy have been quietly developing and testing their system for months before launching widespread attacks. 

What makes VoidProxy particularly dangerous is how it works as a “crime-as-a-service” platform. This means that even cybercriminals without advanced technical skills can now launch  attacks that were previously only possible for highly skilled hackers. The service provides everything needed to run effective phishing campaigns.

Here’s how a typical VoidProxy attack works; You receive what  an email asking you to log into your Microsoft 365 or Google account. When you click the link and enter your credentials, you’re actually interacting with a fake site that looks identical to the real thing. As you complete your normal login process, including entering security codes from your phone, VoidProxy captures everything in real-time. Most importantly, it steals something called session tokens, which are like digital keys that prove you’ve already logged in successfully. With these tokens, attackers can access your account as if they were you, without having to repeat the login process.

Virtually anyone using Microsoft 365 or Google services could be at risk, but certain groups are particularly attractive targets. Businesses relying on Microsoft 365 for their operations face significant risks due to the valuable data these accounts contain. Educational institutions using Google Workspace or Microsoft education services are also prime targets because they typically have large user bases with varying levels of security awareness. Government agencies and high-profile individuals like executives, researchers, and journalists may be specifically targeted for the sensitive information they possess.

The challenge with VoidProxy is that it’s incredibly difficult to detect. The fake login pages look exactly like the real ones, and because the service uses legitimate-looking web addresses and encrypted communications, it often slips past traditional security measures. 

However, there are steps organizations and individuals can take to protect themselves. Strong email filtering systems can help block phishing emails before they reach users. 

Regular security training should teach people about these advanced attacks and help them identify suspicious login requests. Organizations should implement strict controls that limit login attempts from unusual locations or devices and regularly monitor account activity for signs of unauthorized access.

One of the most effective defenses against these attacks is using physical security keys instead of text messages or apps for multi-factor authentication. These hardware devices are much more resistant to phishing attacks because they can verify they’re communicating with the real service, not a fake one.

As more organizations move their operations to cloud services, the security of these platforms becomes increasingly critical.

Security companies and cloud providers are working to detect and stop VoidProxy campaigns, but the service’s sophisticated design makes this challenging. Organizations need to work closely with their security vendors to ensure their protection systems are updated with the latest information about these threats.

VoidProxy likely represents just the beginning of a new generation of phishing services. Its success will probably inspire similar offerings and drive further innovation in cybercrime. Organizations must prepare for a world where traditional multi-factor authentication may not provide adequate protection against determined attackers.

Related Posts:

  • router-595x335_0
    US And UK Warn Of Custom Malware Vulnerability On…
  • mfa-bypass-kit-simplifies-phishing-attacks-on-gmail-and-microsoft-365-accounts_1500
    New 2FA Bypass Threatens Google, Microsoft Users
  • Microsoft_passwordless
    Microsoft Will Roll Out Passkey Support For All Consumers
  • Microsoft_Office_Outlook_(2018–present).svg
    16 Days: Countdown to Outlook’s New Rules for 500M Users
  • shutterstock_2350808261
    Microsoft Notifies Users of the Mandatory 2FA Deadline
  • passkey-sync
    Google Begins Rollout Of Passkeys Across Its Services
  • Microsoft Unveils New Surface Laptop
    Microsoft Plans Password Deletion for 1 Billion Users
  • Proton-Launches-Cross-Platform-Authenticator-App-with-Secure-Sync
    Proton Launch A New 2FA App

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: cybersecuritygoogle accountsmicrosoft 365PhishingVoidproxy
Akinola Ajibola

Akinola Ajibola

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • VoidProxy Targets Microsoft 365 & Google Accounts September 15, 2025
  • Count Down To The End Of Windows 10 Microsoft Support September 14, 2025
  • Copilot Adds Audio Generation with Expressive Voices September 13, 2025
  • Nigerian Government Removes 5% Tax on Call & Data Service September 12, 2025
  • Amid Violent Anti-Corruption Protests, Nepalis Turn to Jack Dorsey’s Bitchat September 12, 2025
  • Bain Sells Data Centres for $4 Billion to HEC-Led Group September 12, 2025

Browse Archives

September 2025
MTWTFSS
1234567
891011121314
15161718192021
22232425262728
2930 
« Aug    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.