When privacy creates blind spots: the exploitation of privacy-first tech
New research reveals how privacy-first technologies are creating fraud blind spots, as AI-driven attacks scale faster than detection capabilities.
Read More
In 2025, phishing kits stopped being basic. Clunky fake login pages are out, and sophisticated industrial-grade phishing is in.
New research from the threat team at Barracuda shows that the number of known phishing-as-a-service (PhaaS) kits doubled during 2025, and 90% of high-volume phishing campaigns they tracked relied on these ready-made toolchains. It means criminals don’t need advanced tech skills to launch complex social engineering attacks at scale – the barrier to entry is getting lower all the time.
New kits have stuck to familiar lures (invoices, HR policy updates, legal docs, ‘please sign this DocuSign’) but delivery has levelled up. According to the research, QR codes embedded within an email are a rising tactic to get victims onto their smartphones, enabling criminals to bypass multiple desktop controls.
Barracuda’s technique breakdown reads like a modern kit feature list:
And the long tail is dangerous too: polymorphic changes to headers/bodies/destinations (20%), malicious QR codes (19%), attachments (18%), plus smaller-but-nasty tactics like Blob URIs (2%) and ClickFix ‘copy/paste this command’ social engineering (1%).
The newest kits are achieving a level of stealth not seen in previous versions.
They’ve become very effective at wasting analyst time with obfuscation layers and anti-debugging; defeating automated analysis like anti-bot; geofencing and fingerprinting; and mimicking systems that make the victim feel like nothing is out of the ordinary, like post-theft redirects to innocuous pages.
The research points to a busier kit market with incumbents like Tycoon 2FA and Mamba 2FA now competing with the newer names of Cephas, Whisper 2FA, and GhostFrame.
As the technology embedded in the kits keeps advancing, they’re becoming harder to detect. Some can integrate directly with legitimate Microsoft APIs to validate stolen credentials/tokens and improve takeover success rates. Others can appear harmless to static scanning tools using dynamic subdomains and staged iframes.
According to Barracuda’s researchers, it’s not just new threat groups keeping up with these developments – with a late-2025 surge of close to 10 million attacks from the old player Mamba 2FA.
Based on this research (and some further reading), here are two ways we expect phishing kits to evolve over the coming year:
There’s a strong argument here to move towards phishing-resistant MFA, and tighten session and token controls (because cookie theft is the new password spray).
We also need to treat QR codes and human verification steps as first-class indicators in email and user training.
And organisations should invest in detection that handles obfuscation and staged delivery (think dynamic subdomains, iframes, Blob URIs), plus monitoring that spots account takeover early.
In 2025, kits got better at looking real. In 2026, they’ll get better at operating for real.
Join the newsletter to receive the latest updates in your inbox.
New research reveals how privacy-first technologies are creating fraud blind spots, as AI-driven attacks scale faster than detection capabilities.
Read More
Cybersecurity founders share how Black Hat MEA helps them test ideas, prove product value, and grow their business.
Read More
Cybersecurity is now a leading barrier to financial innovation. New research explains why fraud, legacy systems and risk are slowing payments progress.
Read More