MFA raises the bar but doesn't stop determined attackers. They're using adversary-in-the-middle phishing, MFA fatigue attacks, session token theft, and SIM swapping. Stronger authentication methods, conditional access, and identity threat detection are the answer.
How MFA Is Being Bypassed
1. Adversary-in-the-Middle (AiTM) Phishing
How it works:
- Attacker creates phishing site that proxies to real login page
- User enters credentials AND MFA code
- Attacker captures session token after authentication completes
- Attacker uses token to access account—no MFA prompt for them
Scale: AiTM phishing kits are commodity tools. Thousands of these attacks happen daily.
2. MFA Fatigue (Prompt Bombing)
How it works:
- Attacker has valid credentials (from breach, phishing, etc.)
- Attacker repeatedly triggers MFA push notifications
- User gets frustrated or confused
- User eventually approves to make it stop
Defence: Number matching (user must enter code shown on screen, not just approve).
3. Session Token Theft
How it works:
- Malware on device steals session cookies
- Attacker uses cookies to access authenticated sessions
- No login needed—session is already authenticated
4. SIM Swapping
How it works:
- Attacker convinces mobile carrier to transfer victim's number
- SMS verification codes go to attacker
- Attacker can reset passwords and receive MFA codes
Defence: Don't use SMS for MFA. Use authenticator apps or hardware keys.
5. Social Engineering
How it works:
- Attacker calls helpdesk pretending to be user
- Claims to be locked out, lost phone, etc.
- Helpdesk resets MFA or provides bypass
Defence: Strong identity verification for sensitive account changes.
Stronger Authentication
Phishing-resistant MFA
FIDO2/WebAuthn (hardware keys, passkeys):
- Cryptographically bound to legitimate site
- Can't be phished—won't work on fake sites
- Best protection against AiTM attacks
- Certificate-based, device-bound
- Phishing-resistant for Windows environments
Number matching
Requires user to enter code from login screen into authenticator app. Prevents blind approval of push notifications.
Now default in Microsoft Authenticator. If you haven't enabled it, do so immediately.
Conditional Access
Risk-based authentication:
- Detect anomalous sign-in patterns
- Require step-up authentication for risky logins
- Block impossible travel scenarios
- Require compliant device for sensitive access
- Restrict access to managed devices
- Block high-risk locations
- Require specific authentication strength by resource
Identity threat detection
Monitor for compromise indicators:
- Anomalous sign-in patterns
- Token replay attempts
- Suspicious MFA activity
- Compromised credential detection
Action Plan
Immediate
- Enable number matching for MFA push
- Block legacy authentication (protocols that bypass MFA)
- Review admin account MFA methods
Short-term
- Implement Conditional Access policies
- Enable identity protection alerts
- Require managed devices for sensitive access
Medium-term
- Deploy phishing-resistant MFA (FIDO2 keys for admins, passkeys for users)
- Implement continuous access evaluation
- Deploy identity threat detection
What We Implement
For managed clients:
- Conditional Access configured for real protection, not just compliance
- Number matching enabled by default
- Identity Protection alerts monitored and actioned
- Phishing-resistant MFA for privileged accounts
- Legacy auth blocked
