Inside Operation - STAR BLIZZARD: MFA Bypass via Adversary-in-the-Middle (AiTM)
When passwords no longer keep attackers out, and even Multi-Factor Authentication (MFA) can be bypassed... welcome to the icy operations of Star Blizzard—a Russia-backed cyber espionage group targeting critical defense infrastructure across NATO, the UK, and the U.S.
Your mission? Become the adversary.
This lab will put you in the role of a state-sponsored threat actor and reenact a scenario that was influenced by one of the scariest attack chains in recent memory: MFA Bypass via Adversary-in-the-Middle (AiTM). This is no longer theoretical. This is how contemporary espionage in the digital trenches looks.
APT Background: The Cold Precision of Star Blizzard
Star Blizzard, a Russian state-sponsored cyber espionage organization, also known by the aliases TA446 and SEABORGIUM. The gang, which has been active since at least 2017, is thought to be connected to Russia's FSB and is notorious for attacking government organizations, defense contractors, think tanks, and private citizens in the United Kingdom, the United States, and NATO countries.
Their focus isn’t monetary—it’s intelligence. And their approach is surgical.
With increasing reliance on cloud platforms like Azure AD, adversaries like Star Blizzard adapt and thrive in modern identity-centric environments.
Behind the Curtain: How Star Blizzard Moves
This operation is not just about sending random emails. It’s about deception at scale, using reverse proxies like Evilginx to manipulate the trust chain in real-time.
In this lab, you’ll replicate this chain of operations:
The Technical Arsenal
This lab brings you face-to-face with one of the most effective MFA bypass techniques, used by advanced groups to gain cloud access without ever needing to crack MFA.
“This is how real breaches start—one deceptive click at a time.”
The Objective
Star Blizzard isn’t after noise—they’re after access, intel, and stealth. In their campaign, they didn’t just phish credentials. They went further.
Your challenge in this simulation is to execute a highly targeted AiTM phishing campaign and gain unauthorized access to a cloud identity platform—without ever needing the victim’s MFA device.
Attack Flow
Attack Chain Breakdown
1. Infrastructure Setup by Threat Actor
2. Attack Flow
Step 1: Generate Lure Link (via Evilginx)
Step 2: Send Phishing Email
Step 3: Capture Credentials + MFA
Step 4: Session Hijacking
Step 5: Privilege Escalation & Recon
Can You Steal the Flag Before the Cookie Expires?
You have a small window of opportunity. The cookies are valid, but time is against you.
Step into the adversary’s shoes. Execute the campaign. Evade detection.
Then ask yourself: if you can do this in 20 minutes… imagine what an APT can do in 20 days.
Train Like the Adversary
If you want to experience this attack first-hand—not just read about it—this lab is live on the Infinity Platform, where you can simulate Star Blizzard’s operations in a safe, hands-on environment.
[Access Lab Here]
Infinity is a threat emulation platform that lets you train like nation-state APTs, with full visibility into each phase of the attack.