• AI Search
  • Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home Security

VoidProxy Targets Microsoft 365 & Google Accounts

Akinola Ajibola by Akinola Ajibola
September 15, 2025
in Security
Share on FacebookShare on Twitter

A dangerous new online scam called Voidproxy is making waves in the cybersecurity world, and it’s targeting some of the most popular services we use every day.  This phishing service is going after Microsoft 365 and Google accounts with alarming success, and what makes it particularly scary is how it can bypass even the strongest security measures.

The most concerning aspect of VoidProxy is that it can defeat multi-factor authentication, which is supposed to be one of our best defenses against hackers.

Security researchers first spotted attacks from VoidProxy starting in January 2025, but investigations revealed that criminals were advertising this service on the dark web marketplaces as early as August 2024. This means the people behind VoidProxy have been quietly developing and testing their system for months before launching widespread attacks. 

What makes VoidProxy particularly dangerous is how it works as a “crime-as-a-service” platform. This means that even cybercriminals without advanced technical skills can now launch  attacks that were previously only possible for highly skilled hackers. The service provides everything needed to run effective phishing campaigns.

Here’s how a typical VoidProxy attack works; You receive what  an email asking you to log into your Microsoft 365 or Google account. When you click the link and enter your credentials, you’re actually interacting with a fake site that looks identical to the real thing. As you complete your normal login process, including entering security codes from your phone, VoidProxy captures everything in real-time. Most importantly, it steals something called session tokens, which are like digital keys that prove you’ve already logged in successfully. With these tokens, attackers can access your account as if they were you, without having to repeat the login process.

Virtually anyone using Microsoft 365 or Google services could be at risk, but certain groups are particularly attractive targets. Businesses relying on Microsoft 365 for their operations face significant risks due to the valuable data these accounts contain. Educational institutions using Google Workspace or Microsoft education services are also prime targets because they typically have large user bases with varying levels of security awareness. Government agencies and high-profile individuals like executives, researchers, and journalists may be specifically targeted for the sensitive information they possess.

The challenge with VoidProxy is that it’s incredibly difficult to detect. The fake login pages look exactly like the real ones, and because the service uses legitimate-looking web addresses and encrypted communications, it often slips past traditional security measures. 

However, there are steps organizations and individuals can take to protect themselves. Strong email filtering systems can help block phishing emails before they reach users. 

Regular security training should teach people about these advanced attacks and help them identify suspicious login requests. Organizations should implement strict controls that limit login attempts from unusual locations or devices and regularly monitor account activity for signs of unauthorized access.

One of the most effective defenses against these attacks is using physical security keys instead of text messages or apps for multi-factor authentication. These hardware devices are much more resistant to phishing attacks because they can verify they’re communicating with the real service, not a fake one.

As more organizations move their operations to cloud services, the security of these platforms becomes increasingly critical.

Security companies and cloud providers are working to detect and stop VoidProxy campaigns, but the service’s sophisticated design makes this challenging. Organizations need to work closely with their security vendors to ensure their protection systems are updated with the latest information about these threats.

VoidProxy likely represents just the beginning of a new generation of phishing services. Its success will probably inspire similar offerings and drive further innovation in cybercrime. Organizations must prepare for a world where traditional multi-factor authentication may not provide adequate protection against determined attackers.

Related Posts:

  • Announcing-the-new-admin-center-1c
    Microsoft 365 Admin Center Logins Will Require MFA
  • mfa-bypass-kit-simplifies-phishing-attacks-on-gmail-and-microsoft-365-accounts_1500
    New 2FA Bypass Threatens Google, Microsoft Users
  • shutterstock_2350808261
    Microsoft Notifies Users of the Mandatory 2FA Deadline
  • Microsoft_Office_Outlook_(2018–present).svg
    16 Days: Countdown to Outlook’s New Rules for 500M Users
  • Microsoft_passwordless
    Microsoft Will Roll Out Passkey Support For All Consumers
  • passkey-sync
    Google Begins Rollout Of Passkeys Across Its Services
  • Microsoft Unveils New Surface Laptop
    Microsoft Plans Password Deletion for 1 Billion Users
  • Proton-Launches-Cross-Platform-Authenticator-App-with-Secure-Sync
    Proton Launch A New 2FA App

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: cybersecuritygoogle accountsmicrosoft 365PhishingVoidproxy
Akinola Ajibola

Akinola Ajibola

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • Meta Acquires Robotics Startup To Boost & Improve Its Humanoid AI Efforts May 2, 2026
  • xAI Rolls out Grok 4.3 and a New Voice Cloning Suite May 2, 2026
  • Pentagon Taps Nvidia, Microsoft And AWS To Bring AI To Classified Networks May 1, 2026
  • Hackers Are Exploiting Critical cPanel Bug, Putting Millions of Websites at Risk May 1, 2026
  • Alibaba’s Metis Agent Aims to Fix ‘Trigger‑Happy’ AI Tool Use With New RL Framework May 1, 2026
  • Samsung Q1 2026 Earnings: Record Profit Driven by AI Memory Chip Boom May 1, 2026
  • Qualcomm Q1 2026 Earnings: China Weakness and AI Push Drive Mixed Results May 1, 2026
  • Amazon Q1 2026 Earnings: AWS and AI Drive Strong Growth Despite Spending Concerns May 1, 2026
  • Meta Q1 2026 Earnings: Strong Revenue Growth Overshadowed by Massive AI Spending May 1, 2026
  • Apple Q2 2026 Earnings: $111B Revenue, iPhone 17 Drives Record Growth May 1, 2026
  • IBM Rolls out ‘Bob’, an AI Development Partner Built around Multi-model Routing and Human Checkpoints April 29, 2026
  • iOS 27 Reportedly Adds New Apple Intelligence Photo Editing Tools April 29, 2026

Browse Archives

May 2026
MTWTFSS
 123
45678910
11121314151617
18192021222324
25262728293031
« Apr    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • AI Search
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

Chat with TechBooky AI
💬
TechBooky AI ✕
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.