Ask Runable forDesign-Driven General AI AgentTry Runable For Free
Runable
Back to Blog
Cybersecurity6 min read

The Dark Side of No-Code: How App Builders Are Being Hijacked to Steal Microsoft Account Details [2025]

Explore how cybercriminals exploit no-code platforms like Bubble.io to phish Microsoft credentials, and learn how to protect yourself. Discover insights about t

no-code platformsBubble.ioMicrosoft account securityphishing attackscybersecurity+5 more
The Dark Side of No-Code: How App Builders Are Being Hijacked to Steal Microsoft Account Details [2025]
Listen to Article
0:00
0:00
0:00

Introduction

No-code platforms have revolutionized app development by empowering non-developers to create applications without writing a single line of code. But with great power comes great responsibility—and risk. Recently, cybercriminals have found a way to exploit these platforms, specifically targeting Bubble.io, a popular no-code app builder, to steal Microsoft account credentials. This article delves into the intricacies of how these attacks work, the implications for users, and how to safeguard against such threats.

Introduction - contextual illustration
Introduction - contextual illustration

The no-code development platform market is projected to grow significantly, from

12.5billionin2020to12.5 billion in 2020 to
45.5 billion by 2025, highlighting the increasing importance of security measures. According to Fortune Business Insights, the market's growth underscores the need for enhanced security protocols.

TL; DR

  • No-code platforms are being exploited: Cybercriminals use platforms like Bubble.io to create phishing sites that bypass traditional security measures, as reported by Kaspersky.
  • Microsoft accounts targeted: These phishing sites aim to steal Microsoft 365 credentials, a tactic highlighted in Microsoft's security blog.
  • Security loopholes exist: The trusted nature of these domains helps attackers evade email security filters, as noted by Microsoft.
  • Protective measures are crucial: Implementing multi-factor authentication and educating users can mitigate risks, as advised by PCMag.
  • Future outlook: As no-code platforms grow, so does the need for robust security protocols, as discussed in CIO.

Projected Growth of No-Code Platform Market
Projected Growth of No-Code Platform Market

The no-code platform market is projected to grow from

13.5billionin2021to13.5 billion in 2021 to
45.5 billion by 2025, indicating a strong upward trend.

Understanding No-Code Platforms

No-code platforms like Bubble.io allow users to build fully-functional applications through a visual interface. They abstract the complexity of coding into a drag-and-drop system, enabling rapid prototyping and deployment.

Key Features of No-Code Platforms

  • Visual Development: Users can create applications visually, using a drag-and-drop interface.
  • Pre-Built Templates: A variety of templates expedite the development process.
  • Integrations: Easy integration with APIs and third-party services.
  • Scalability: Applications can scale with user requirements without needing to rewrite code.

Understanding No-Code Platforms - contextual illustration
Understanding No-Code Platforms - contextual illustration

The Hijacking Incident

How Attackers Exploit No-Code Platforms

Attackers have started using no-code platforms to create phishing sites that mimic legitimate login pages. These are hosted on trusted domains, which helps them bypass email security filters and land directly in users' inboxes, as detailed in Kaspersky's analysis.

Why This Works

  1. Trusted Domains: No-code platforms often use subdomains of their main website, which are inherently trusted by email filters.
  2. Ease of Use: Attackers can quickly set up phishing sites without technical expertise.
  3. Scalability: Phishing sites can be rapidly deployed, targeting multiple victims simultaneously.

Real-World Example

In one reported incident, attackers used Bubble.io to host a fake Microsoft 365 login page. Victims received emails directing them to the site, where they unknowingly entered their credentials, which were then harvested by the attackers, as highlighted in Microsoft's blog.

The Hijacking Incident - contextual illustration
The Hijacking Incident - contextual illustration

Common Tactics in No-Code Platform Exploits
Common Tactics in No-Code Platform Exploits

Attackers exploit no-code platforms primarily through trusted domains (40%), ease of use (30%), and scalability (30%). Estimated data.

Protecting Your Microsoft Account

Multi-Factor Authentication (MFA)

Implementing MFA is one of the most effective ways to protect your accounts. It requires users to provide two or more verification factors to gain access, as recommended by PCMag.

How to Set Up MFA

  1. Log into your Microsoft account.
  2. Navigate to Security settings.
  3. Select 'Two-step verification' and follow the prompts.
  4. Choose your preferred method (SMS, authenticator app, etc.).
QUICK TIP: Use an authenticator app instead of SMS for more secure MFA.

Recognizing Phishing Attempts

Educating users to recognize phishing attempts is crucial. Here are some red flags:

  • Unexpected Requests: Emails asking for urgent action on your account.
  • Suspicious Links: URLs that don’t match the official domain.
  • Poor Grammar and Spelling: Often indicative of phishing attempts.

Protecting Your Microsoft Account - contextual illustration
Protecting Your Microsoft Account - contextual illustration

Technical Safeguards

Implementing Security Protocols

For developers and IT teams, implementing security protocols within the no-code platform environment is essential.

Use Content Security Policy (CSP)

CSP is a security feature that helps prevent a variety of attacks, such as cross-site scripting (XSS) and data injection, as explained in Imperva's guide.

html
<meta http-equiv="Content-Security-Policy" content="default-src 'self'; img-src 'self' https://trusted.com;">

Regular Security Audits

Conducting regular audits can help identify vulnerabilities before they are exploited.

  • Automated Tools: Use tools like Qualys or Tenable for continuous monitoring.
  • Manual Reviews: Periodic manual reviews offer insights that automated tools might miss.

Technical Safeguards - contextual illustration
Technical Safeguards - contextual illustration

Future Trends in No-Code Security

Growth of No-Code Platforms

As no-code platforms continue to grow, they will likely become more appealing targets for cybercriminals. This growth necessitates stronger security measures, as discussed in Fortune Business Insights.

Predicted Trends

  • Increased Use of AI: AI could be used to detect and prevent suspicious activities within no-code environments, as noted in AI Magazine.
  • Enhanced User Education: More resources will be devoted to educating users about potential threats.
DID YOU KNOW: The global no-code development platform market is expected to grow from $12.5 billion in 2020 to $45.5 billion by 2025.

Recommendations for Users and Developers

  • Stay Informed: Keep up with the latest security news and updates related to your platform.
  • Use Strong Passwords: Implement password managers to generate and store complex passwords.
  • Report Suspicious Activity: If you suspect a phishing attempt, report it to your IT department immediately.

Future Trends in No-Code Security - contextual illustration
Future Trends in No-Code Security - contextual illustration

Conclusion

The hijacking of no-code platforms like Bubble.io to steal Microsoft account details is a stark reminder of the vulnerabilities that come with new technologies. While these platforms offer incredible opportunities for innovation, they also require us to remain vigilant about security. By understanding the risks and implementing robust security measures, we can protect ourselves and our organizations from these emerging threats.

FAQ

What are no-code platforms?

No-code platforms are tools that allow users to create applications through a visual interface without writing code, as explained by CIO.

How are no-code platforms exploited by cybercriminals?

Cybercriminals use these platforms to create phishing sites on trusted domains, bypassing security filters and capturing user credentials, as detailed in Kaspersky's report.

How can I protect my Microsoft account from phishing attacks?

Use multi-factor authentication, recognize phishing red flags, and regularly update your security settings, as advised by PCMag.

What role does AI play in future no-code security?

AI can help detect and mitigate suspicious activities within no-code environments, enhancing overall security, as noted in AI Magazine.

Why are phishing attacks on the rise?

The rise in phishing attacks is due to increased digital interaction and the ease with which attackers can exploit no-code platforms, as discussed in Kaspersky's analysis.

What should I do if I suspect a phishing attempt?

Report it immediately to your IT department and avoid clicking on any suspicious links, as recommended by Microsoft.

Are there tools for conducting security audits on no-code platforms?

Yes, tools like Qualys and Tenable can be used for continuous monitoring and security audits, as mentioned by Qualys and Tenable.

Can no-code platforms be used securely?

Yes, with proper security measures, user education, and regular audits, no-code platforms can be used securely, as highlighted in CIO.

Is the no-code platform market expected to grow?

Yes, it's projected to grow significantly, reaching $45.5 billion by 2025, as reported by Fortune Business Insights.


Key Takeaways

  • No-code platforms like Bubble.io are being exploited for phishing.
  • Microsoft 365 accounts are prime targets for these attacks.
  • Implementing MFA can significantly enhance account security.
  • User education is vital in recognizing phishing attempts.
  • AI and regular security audits are future trends in combating these threats.

Related Articles

Cut Costs with Runable

Cost savings are based on average monthly price per user for each app.

Which apps do you use?

Apps to replace

ChatGPTChatGPT
$20 / month
LovableLovable
$25 / month
Gamma AIGamma AI
$25 / month
HiggsFieldHiggsField
$49 / month
Leonardo AILeonardo AI
$12 / month
TOTAL$131 / month

Runable price = $9 / month

Saves $122 / month

Runable can save upto $1464 per year compared to the non-enterprise price of your apps.