
"Cybersecurity analysts have popularized the term “multi-factor authentication (MFA) bypass.” It now appears regularly in threat reports, vendor pitches, board presentations, and analyst briefings. According to recent industry findings, nearly one in three incidents last year involved credential theft. Infostealer delivery increased 84% year over year, and adversary-in-the-middle (AiTM) phishing kits are now sold as turnkey services on the Dark Web. The common framing across these tactics is that attackers bypass MFA. They usually do not."
"A help desk agent who resets an authenticator after a social engineering call is not bypassing MFA. An infostealer that lifts a session cookie from a browser's local storage has not defeated the second factor. A device code phishing campaign tricking a user into authorizing an attacker's device through a legitimate flow has not broken MFA. In each case, MFA may have worked exactly as designed. The attacker operated on a surface that MFA was never built to protect."
"That distinction matters because it shapes security investments. If you call session theft an MFA bypass, the response is to buy a stronger factor. If you call it what it is, a post-authentication detection gap, the response shifts to session monitoring, token binding, and continuous risk evaluation. The misnomer keeps MFA at the center of a problem it cannot solve alone. It also understates the role of identity threat detection and risk mitigation across the rest of the attack chain."
"The FBI Cyber Podcast conversation with Mandiant Chief Technology Officer Charles Carmakal is unusually direct about how Scattered Spider and similar groups operate. Attackers call service desks, impersonate employees, and request MFA resets or credential recovery. The success of the campaign depends on whether the agent approves the request without proper identity verification."
Nearly one in three incidents involved credential theft, infostealer delivery rose 84% year over year, and AiTM phishing kits are sold as turnkey services. Many tactics are framed as bypassing multi-factor authentication, but common examples show MFA can work as designed while attackers operate on surfaces MFA was never built to protect. Help desk resets after social engineering are not MFA bypasses, session cookie theft from local storage is not defeating a second factor, and device code phishing that uses legitimate authorization flows does not break MFA. Mislabeling these events drives investment toward stronger factors instead of addressing post-authentication detection gaps, session monitoring, token binding, and continuous risk evaluation across the identity attack chain.
#multi-factor-authentication #credential-theft #session-hijacking #identity-lifecycle-security #phishing-and-social-engineering
Read at Securitymagazine
Unable to calculate read time
Collection
[
|
...
]