These kits not only facilitate attacks, but also automate some parts, making it much easier and cost effective for threat actors to execute attacks.
Increasingly we're seeing these attacks take the form of AiTM phishing attacks.
This uses email or a messaging service to create the conditions for an attacker to intercept and manipulate communications between a user and a legitimate service in order to steal credentials and authenticated access tokens.
But AiTM attacks level up on these phishing attacks, taking them a step further.
However, a sharp increase in adversary-in-the-middle (AiTM) attacks means that MFA alone may no longer be enough.