Related Posts
Subscribe via Email
Subscribe to our blog to get insights sent directly to your inbox.
Modern phishing attacks don’t care how many authentication factors you use.
Multi-factor authentication (MFA) is one of the most commonly used and recommended cybersecurity practices. And to be clear—it’s still important. But it’s not enough.
During a recent webinar, Breaking Down an Attack: Real-Time Detection and Response with Microsoft Sentinel we shared how attackers are bypassing MFA entirely. The takeaway? Even strong authentication can’t protect you if your users are tricked into giving away their session.
If MFA is your main line of defense, here’s why that’s not enough anymore.
Note: This blog highlights how to reduce the risk using Microsoft tools, but this challenge is platform-agnostic. If you have questions about your environment, we’re happy to help.
Mike Spadolini from TD SYNNEX walked through a phishing attack using an open-source reverse proxy tool. It took under three minutes to steal a user’s credentials and active session—even with MFA enabled through Microsoft Authenticator.
Here’s how it worked:
This wasn’t theoretical. It was a live demo with real tools that anyone could access. And the scary part? Initial Access Brokers are using these techniques to harvest account access and selling this access to other criminal elements to take advantage.
“It took me all of three minutes to steal someone’s username, password, and session—even with MFA.”—Mike Spadolini, Microsoft Cloud Solution Architect, TD SYNNEX
This isn’t just about stolen passwords. Modern phishing is about session hijacking. Once an attacker has the session token, they can move through your environment as if they’re the user, no matter how many factors you’ve set up.
You may not be able to stop every click, but you can see when something suspicious happens—and act on it fast. In this instance, that’s where Microsoft Sentinel, a cloud-native SIEM, and Microsoft Defender come in. They help you catch the signs of compromise, investigate quickly, and take meaningful action before things spread.
Here’s how to move beyond checkbox security and build real-world protection:
We showed the full phishing attack and walked through how Microsoft Sentinel helps detect and respond to threats like this in real time. Watch the webinar: Breaking Down an Attack: Real-Time Detection and Response with Microsoft Sentinel. Learn how attackers bypass MFA and explore practical ways to improve your detection and response strategy.
Don't miss another article. Subscribe to our blog today.
Ryan Berg is a Technical Fellow at NuHarbor Security with over 25 years of experience in security, risk management, and secure application development. He holds multiple patents and is a sought-after speaker, instructor, and author in his field. Before joining NuHarbor, Ryan co-founded three successful security companies that specialize in application security, operating system security, and malware analysis. Currently, Ryan is active in research and development focused on SOC alert and response automation and artificial intelligence.
Subscribe to our blog to get insights sent directly to your inbox.