'Adversary in the middle attacks' are becoming hackers' go-to method to bypass MFA
Briefly

"Microsoft stated that numerous cyber criminal and online threat actors purchased these kits and used them in widespread phishing campaigns, effectively bypassing security measures and breaking into customer accounts."
"The operation, known for its advancing sophistication, employed adversary in the middle (AiTM) techniques, which allow attackers to intercept and modify communications between two parties, thus stealing sensitive data."
Read at ITPro
[
|
]