Identity Security

MFA Is Not Enough: How Attackers Bypass Multi-Factor Authentication and What to Do About It

If your organization deployed MFA and considered identity security handled, you are not alone. But you are exposed. Adversary-in-the-middle (AiTM) phishing attacks surged 146% in the past year, with nearly 40,000 incidents detected daily according to Microsoft's Digital Defense Report. Eleven major phishing kits now circulate commercially as Phishing-as-a-Service platforms, available for as little as $100 per month. The uncomfortable truth: traditional MFA protects the authentication moment, but does nothing about what happens after. Attackers have adapted, and most organizations have not.

This is not a theoretical risk. The MGM breach cost over $100 million after attackers bypassed MFA through a single help desk phone call. The Uber breach started with MFA push fatigue -- an attacker bombarded a contractor with notifications for over an hour until one was approved. Snowflake's customer data breaches in 2024 exploited accounts that simply did not have MFA enabled at all. Every one of these was preventable.

The Five MFA Bypass Techniques You Need to Understand

Attackers are not brute-forcing their way through MFA. They are going around it. Here are the five techniques we see most frequently in real-world engagements:

1. Adversary-in-the-Middle (AiTM) Phishing

This is the most rapidly growing attack vector. The attacker positions a reverse proxy between the victim and the real login page. The user enters credentials and completes MFA normally -- but they are authenticating through the attacker's infrastructure. The proxy captures the session token that results from successful authentication, then replays it to access the account directly.

Phishing kits like Tycoon 2FA, EvilProxy, Sneaky 2FA, and Evilginx make this trivial to execute. According to research from Sekoia.io, Tycoon 2FA alone earned a 4.8 out of 5 threat score based on infrastructure monitoring and detection telemetry in early 2025. The distribution methods have evolved rapidly -- from QR codes embedded in documents, to HTML attachments with embedded JavaScript, to malicious SVG files that render phishing pages directly.

The critical point: the user's MFA worked perfectly. The second factor was verified. The attack succeeds because the attacker steals the session token that proves authentication already happened.

2. MFA Fatigue (Push Bombing)

When attackers have valid credentials (purchased from dark web markets or harvested from previous breaches), they trigger repeated MFA push notifications until the user approves one out of frustration, confusion, or simply to make the notifications stop. The Lapsus$ threat group used this technique repeatedly against Microsoft, Nvidia, Samsung, and Uber throughout 2022, often sending push notifications continuously for over an hour.

3. Session Token and Cookie Theft

Once a user authenticates, the session token becomes the key to the kingdom. Attackers steal these tokens through malware, malicious browser extensions, AiTM attacks, or cross-site scripting vulnerabilities. Token theft produces no failed login attempts, no MFA prompt failures, and no impossible travel alerts. The login event looks identical whether the session is legitimate or compromised. Refresh tokens are particularly dangerous -- they can survive password resets and MFA invalidation, giving attackers persistent access even after your incident response team thinks the threat is contained.

4. Social Engineering the Help Desk

Attackers research employees on LinkedIn, then call the IT help desk impersonating that person and request an MFA reset. This is exactly how the MGM breach began -- an attacker called the Okta help desk, convinced staff to remove MFA from an account, and used compromised credentials to gain initial access that ultimately led to a ransomware deployment.

5. Exploiting Legacy Protocols and Coverage Gaps

IMAP, POP3, SMTP, and Exchange ActiveSync were designed before MFA existed. In Microsoft 365 environments where basic authentication has not been fully disabled, these protocols accept username and password alone -- regardless of what MFA policies are configured for modern authentication. Service accounts, administrative portals with separate auth systems, development environments with relaxed controls, and emergency access accounts all represent coverage gaps where MFA simply does not apply.

Why Traditional MFA Is Fundamentally Limited

The core issue is architectural, not operational. Traditional MFA methods -- SMS codes, TOTP authenticator apps, and push notifications -- verify that you possess a second factor at the moment of authentication. They do not verify that you are on the legitimate login page, they do not bind the authentication to a specific device, and they do not protect the session that follows.

An AiTM proxy can relay a TOTP code in real time before it expires. A push notification approved on a legitimate device grants a session token to whoever triggered the authentication flow. An SMS code intercepted via SIM swap gives an attacker the same access as the legitimate user.

Over 82% of phishing emails now utilize AI, with AI-generated phishing achieving a 60% higher click rate than traditionally crafted messages. The attack surface is expanding faster than awareness training can compensate for.

What Actually Works: Phishing-Resistant MFA

The solution is not more MFA -- it is better MFA. Phishing-resistant authentication methods use cryptographic binding to the legitimate origin, making interception technically impossible. The private key never leaves the authenticator, and the identity provider stores only the public key. During sign-in, the device proves it owns the private key for the specific tenant and challenge.

The methods that qualify as phishing-resistant:

  • FIDO2 security keys (YubiKey, Google Titan, Feitian) -- hardware tokens that perform cryptographic authentication bound to the legitimate domain. Cannot be phished, relayed, or intercepted.
  • Platform passkeys -- built into Windows Hello, Apple Touch ID/Face ID, and Android biometrics. Same cryptographic protection as hardware keys, but stored on the device itself.
  • Certificate-based authentication -- PKI certificates with smart cards or virtual smart cards. Common in government and regulated industries.
  • Platform-specific solutions like Okta FastPass, which binds authentication to the legitimate device and domain.

These methods eliminate entire categories of attacks. AiTM proxies cannot intercept a cryptographic challenge-response that is bound to the real server's origin. Push fatigue is irrelevant because there are no push notifications. SIM swapping is meaningless because there are no SMS codes.

A Practical Deployment Roadmap for SMBs

You do not need to migrate your entire organization overnight. Here is the phased approach we recommend:

Phase 1: Eliminate the Worst Gaps (Week 1-2)

  • Block legacy authentication protocols entirely in your Microsoft 365 or Google Workspace tenant. If IMAP, POP3, and basic auth are still enabled, you have authentication paths that bypass MFA completely.
  • Enable number matching for push notifications. This requires users to enter a number displayed on the login screen rather than simply tapping "Approve," which defeats basic push fatigue attacks.
  • Audit and remove stale OAuth application grants. Unused integrations with long-lived tokens are dormant access paths.
  • Implement help desk verification procedures. Require callback to a registered number or manager approval before any MFA reset.

Phase 2: Deploy Phishing-Resistant MFA for Privileged Users (Week 3-6)

  • Start with IT administrators, executives, and finance team members -- the highest-value targets.
  • Distribute FIDO2 security keys or enable platform passkeys. Budget approximately $25-50 per user for hardware keys.
  • Create a Conditional Access policy (in Entra ID) or equivalent that requires phishing-resistant authentication strength for all admin portals and sensitive applications.
  • Use Temporary Access Passes (TAP) for initial passkey registration, then enforce phishing-resistant methods for all subsequent access.

Phase 3: Expand and Harden (Month 2-3)

  • Roll out passkeys to all users. Encourage registration of at least two credentials (one primary, one backup).
  • Implement Continuous Access Evaluation (CAE) to reduce token lifetime and enable near-real-time revocation.
  • Deploy device compliance policies that require managed, up-to-date endpoints for access.
  • Establish quarterly token hygiene reviews -- audit OAuth grants, revoke stale sessions, remove unused integrations.

Phase 4: Detect What Gets Through (Ongoing)

  • Monitor authentication logs for anomalies: inconsistent User-Agent strings, impossible travel patterns, authentication from known proxy infrastructure (particularly Cloudflare AS13335, which appeared in documented AiTM campaigns).
  • Implement behavioral detection that analyzes post-authentication activity, not just the login event. Legitimate logins and compromised token replays look identical in auth logs -- the difference is in what happens next.
  • Track key metrics: percentage of users on phishing-resistant MFA, risky sign-ins blocked, credential recovery time, and identity-related Secure Score improvements.

What Happens When Token Theft Is Detected

Most incident response playbooks are not built for token compromise. A password reset alone leaves attackers with continued access because refresh tokens survive password changes. When token theft is suspected, you need:

  1. Immediate revocation of all active sessions and OAuth grants for the compromised account
  2. Forced refresh token rotation or revocation
  3. Audit and removal of suspicious OAuth application grants
  4. Device compliance verification for all registered devices
  5. Behavioral investigation of access logs to determine scope
  6. Lateral movement assessment across connected integrations and systems

If your incident response playbook does not include token revocation as step one, update it today.

The Bottom Line

MFA is still essential -- the alternative is far worse. But "we have MFA enabled" is no longer a sufficient answer to identity security. The question is not whether you have MFA, but what kind, where it is enforced, and what happens to the session after authentication succeeds.

The organizations that will be resilient against the next wave of identity attacks are the ones deploying phishing-resistant credentials, minimizing token lifetimes, monitoring post-authentication behavior, and treating identity as a continuous security surface -- not a one-time gate.

Need help securing your identity infrastructure?

We assess MFA configurations, Azure AD/Entra ID environments, and identity attack surfaces for small and mid-size companies. Book a session with our team.