NuHarbor Security
  • Solutions
    Solutions
    Custom cybersecurity solutions that meet you where you are.
    • Overview
    • Our Approach
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • By Business Need
      • Identify Gaps in My Cybersecurity Plan
      • Detect and Respond to Threats in My Environment
      • Fulfill Compliance Assessments and Requirements
      • Verify Security With Expert-Led Testing
      • Manage Complex Cybersecurity Technologies
      • Security Monitoring With Splunk
    • By Industry
      • State & Local Government
      • Higher Education
      • Federal
      • Finance
      • Healthcare
      • Insurance
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Services
    Services
    Outcomes you want from a team of experts you can trust.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Security Testing
      • Penetration Testing
      • Application Penetration Testing
      • Vulnerability Scanning
      • Wireless Penetration Testing
      • Internal Penetration Testing
      • External Penetration Testing
    • Assessment & Compliance
      • CMMC Compliance
      • NIST 800-53
      • HIPAA Security Standards
      • ISO 27001
      • MARS-E Security Standards
      • New York Cybersecurity (23 NYCRR 500)
      • Payment Card Industry (PCI)
    • Advisory & Planning
      • Security Strategy
      • Incident Response Planning
      • Security Program Reviews
      • Security Risk Assessments
      • Virtual CISO
      • Policy Review
    • Managed Services
      • Curated Threat Intelligence
      • Managed Detection and Response (MDR)
      • Sentinel Managed Extended Detection and Response (MXDR)
      • SOC as a Service
      • Splunk Managed Services
      • Tenable Managed Services
      • Vendor Security Assessments
      • Vulnerability Management
      • Zscaler Support Services
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Partners
  • Resources
    Resources
    Explore reports, webinars, case studies, and more.
    • Browse Resources
    • Consultation Icon Consult with an expert
    • Blog icon Blog
    • Podcast icon Podcast
    • Annual SLED CPR icon Annual SLED CPR
    • Downloadable Assets icon Downloadable Assets
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Company
    Company
    We do cybersecurity differently – the right way.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Leadership
    • News
    • Careers
    • Contact
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Consult with an expert
  • Client support
  • Careers
  • Contact
1.800.917.5719
NuHarbor Security Blog
    • Compliance
    • Cybersecurity Technology
    • Security Operations
    • Industry Insights
    • Security Testing
    • Advisory and Planning
    • Application Security
    • Managed Detection and Response
    • Threat Intelligence
    • NuHarbor
    • Managed Services
    • Cyber Talent
April 3, 2025

Why MFA Alone Won’t Save You

Ryan Berg Ryan Berg
Why MFA Alone Won’t Save You

Modern phishing attacks don’t care how many authentication factors you use.

Multi-factor authentication (MFA) is one of the most commonly used and recommended cybersecurity practices. And to be clear—it’s still important. But it’s not enough.

During a recent webinar, Breaking Down an Attack: Real-Time Detection and Response with Microsoft Sentinel we shared how attackers are bypassing MFA entirely. The takeaway? Even strong authentication can’t protect you if your users are tricked into giving away their session.

If MFA is your main line of defense, here’s why that’s not enough anymore.

Note: This blog highlights how to reduce the risk using Microsoft tools, but this challenge is platform-agnostic. If you have questions about your environment, we’re happy to help.

Breaking Down an Attack Real-Time Detection and Response with Microsoft Sentinel

 

What the attack looks like

Mike Spadolini from TD SYNNEX walked through a phishing attack using an open-source reverse proxy tool. It took under three minutes to steal a user’s credentials and active session—even with MFA enabled through Microsoft Authenticator.

Here’s how it worked:

  • A spoofed login page mimicking Microsoft 365 was set up using Evilginx.
  • A user clicked the phishing link, entered credentials, and passed the MFA prompt using their registered MFA Authenticator application.
  • Behind the scenes, the tool captured the session token.
  • That token was then used to log in as the user without requiring re-authentication.

This wasn’t theoretical. It was a live demo with real tools that anyone could access. And the scary part? Initial Access Brokers are using these techniques to harvest account access and selling this access to other criminal elements to take advantage.

“It took me all of three minutes to steal someone’s username, password, and session—even with MFA.”
—Mike Spadolini, Microsoft Cloud Solution Architect, TD SYNNEX

 

What this means for security teams: Three critical implications

  1. MFA is necessary, but not a silver bullet

    We still recommend MFA, of course, but MFA is often not the complete solution that many people believe it to be. Reverse proxy phishing tools make it easy to intercept credentials and tokens. Your users may think they’re logging in safely—but they’re handing over their session to an attacker.

  2. Credential theft has evolved

    This isn’t just about stolen passwords. Modern phishing is about session hijacking. Once an attacker has the session token, they can move through your environment as if they’re the user, no matter how many factors you’ve set up.

  3. Response matters just as much as prevention

    You may not be able to stop every click, but you can see when something suspicious happens—and act on it fast. In this instance, that’s where Microsoft Sentinel, a cloud-native SIEM, and Microsoft Defender come in. They help you catch the signs of compromise, investigate quickly, and take meaningful action before things spread.

How to protect your users with Microsoft Sentinel and Defender

Here’s how to move beyond checkbox security and build real-world protection:

  • Continue using MFA but educate your users. Most phishing attacks succeed because users don’t know what to look for. Awareness training still matters.
  • Monitor behavior, not just logins. Sentinel’s user behavior analytics (UEBA) can detect anomalies like unfamiliar devices, impossible travel, and token reuse.
  • Use conditional access and trusted device policies. Restrict access based on risk levels, device posture, or known IPs. Make it harder for attackers to blend in.
  • Automate your response. Use Logic Apps with Sentinel to trigger automated responses like revoking sessions, alerting analysts, or disabling accounts when high-risk activity is detected.

Want to see this in action?

We showed the full phishing attack and walked through how Microsoft Sentinel helps detect and respond to threats like this in real time. Watch the webinar: Breaking Down an Attack: Real-Time Detection and Response with Microsoft Sentinel. Learn how attackers bypass MFA and explore practical ways to improve your detection and response strategy.

Breaking Down an Attack Real-Time Detection and Response with Microsoft Sentinel

Don't miss another article. Subscribe to our blog today. 

Subscribe now

Included Topics

  • Threat Intelligence,
  • Industry Insights,
  • Managed Detection and Response
Ryan Berg
Ryan Berg

Ryan Berg is a Technical Fellow at NuHarbor Security with over 25 years of experience in security, risk management, and secure application development. He holds multiple patents and is a sought-after speaker, instructor, and author in his field. Before joining NuHarbor, Ryan co-founded three successful security companies that specialize in application security, operating system security, and malware analysis. Currently, Ryan is active in research and development focused on SOC alert and response automation and artificial intelligence.

Related Posts

7 min read
Cybersecurity in Smart Manufacturing: Strategies to Combat the Challenges of IoT, AI, and Automation
Read More
Security Testing 10 min read
Penetration Testing versus Vulnerability Scanning: What's the Difference?
Read More
1 min read
New FFIEC rule that Banks must defend against DDOS, a change in times? Read More

Subscribe via Email

Subscribe to our blog to get insights sent directly to your inbox.

Subscribe Here!

Latest Pwned episodes

Episode 200 - Reflections of Pwned...Until Next Time
April 03, 2024
Episode 200 - Reflections of Pwned...Until Next Time
Listen Now
Episode 199 - When a BlackCat Crosses Your Path...
March 21, 2024
Episode 199 - When a BlackCat Crosses Your Path...
Listen Now
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
March 08, 2024
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
Listen Now
NuHarbor Security logo
NuHarbor Security

553 Roosevelt Highway
Colchester, VT 05446

1.800.917.5719

  • Solutions
  • Services
  • Partners
  • Resources
  • Company
  • Contact
  • Privacy Policy
Connect
  • Twitter
  • Linkedin
  • YouTube
©2025 NuHarbor Security. All rights reserved.