Identity & Access

Every MFA Tool in Your Stack Is Being Bypassed Right Now. Here's Exactly How.

Blog Meta Icon
Alex Turner
Cloud Security Engineer
Blog Meta Icon
May 5, 2026
Blog Meta Icon
10 minute read
Blog Main Image

Deploying MFA was the right decision in 2019. Believing that MFA deployment completed your authentication security posture is the wrong decision in 2026. The breach pattern that defined 2025 and will accelerate through 2026 is not password theft — it is post-authentication session token hijacking. Attackers are not breaking through MFA. They are letting you complete MFA, and then stealing the proof that you did.

How MFA Is Being Defeated: The Five Active Techniques

These are not theoretical attack vectors. All five are being used in active campaigns against mid-market enterprises and large organizations right now. MGM Resorts, Caesars, Okta's own customer support environment, ADT, and dozens of less-publicized breaches share a common thread: MFA was deployed, and attackers bypassed it.

Technique 1: Adversary-in-the-Middle (AiTM) Phishing

AiTM is the dominant credential theft technique for sophisticated financially motivated actors in 2026. The attack works by placing an attacker-controlled proxy between the victim and a legitimate authentication service such as Microsoft 365 or Okta. The victim receives a phishing link. That link leads to a page that proxies the legitimate Microsoft login page in real time. The victim enters their username and password — the attacker captures those credentials and forwards them to the real Microsoft service. Microsoft sends an MFA prompt. The victim approves the prompt. Microsoft generates an authenticated session token. The attacker intercepts that token before it reaches the victim's browser. The victim sees nothing unusual. The attacker now has a valid, authenticated session token. Tools like Evilginx2, Modlishka, and commercial phishing kits have made AiTM attacks accessible to threat actors with minimal technical sophistication. This is not a nation-state technique — it is a commodity tool.

Technique 2: MFA Fatigue (Push Bombing)

The push notification model of MFA is vulnerable to a simple exhaustion attack. The attacker obtains the user's credentials through any method, then initiates authentication repeatedly, triggering a stream of push notification requests to the victim's phone. Most users, confronted with a stream of unexpected MFA notifications, will eventually approve one to stop the notifications, assume it was a system error, or contact the help desk. MGM Resorts' 2023 breach, which cost approximately $100 million, began with a 10-minute LinkedIn search and a phone call to the company's help desk. The help desk reset MFA for the attacker. No AiTM required.

Technique 3: SIM Swapping

Organizations still using SMS-based MFA remain vulnerable to SIM swapping, where an attacker convinces a mobile carrier to transfer the target's phone number to an attacker-controlled SIM card. SIM swapping has become a managed criminal service, with carrier insiders performing swaps for payment. CISA and the FBI have both issued advisories specifically discouraging SMS-based MFA for organizations with elevated risk profiles.

Technique 4: OAuth Consent Phishing

OAuth consent phishing does not need to steal credentials or bypass MFA at all. The attacker creates a malicious application in Microsoft Entra ID or Google Workspace that requests legitimate-looking permissions. The victim clicks Approve. The application receives an OAuth token with whatever permissions the victim's account can grant. If the victim is a Global Administrator, the application may receive delegated access to the entire Microsoft 365 tenant. MFA was completed correctly throughout. The OAuth grant itself does not require MFA.

Technique 5: Pass-the-Cookie

Once an attacker has local code execution on an endpoint, they can extract authenticated session cookies from browser process memory. These cookies represent the authenticated sessions for every site the user is logged into, including corporate applications behind MFA. The attacker can import those cookies into a browser on attacker-controlled infrastructure and access those applications as the authenticated user, without going through MFA at all. The Microsoft Edge cleartext password vulnerability disclosed this week amplifies this risk significantly.

💡 Key Insight

MFA protects the authentication event. It does not protect the authenticated session that event produces. The entire category of modern credential attacks operates in the window between successful authentication and session expiration.

What Actually Stops These Attacks: Phishing-Resistant MFA

The authentication industry has a solution for AiTM and most session-based bypass techniques: phishing-resistant MFA, available through FIDO2/WebAuthn hardware security keys and device-bound passkeys. The technical reason phishing-resistant MFA defeats AiTM is the origin binding property of the FIDO2 protocol. During FIDO2 authentication, the cryptographic signature is computed over the origin of the authentication request — the actual domain name of the site requesting authentication. A FIDO2 authenticator signing a request from login.microsoft.com will produce a signature that is cryptographically invalid if an attacker tries to use it for their proxy. The authentication fails. The attacker captures nothing.

This property is not present in TOTP codes (Google Authenticator, Authy, Microsoft Authenticator in code mode) or push notifications. A TOTP code generated for an AiTM phishing site is a valid code that works on the real site. The gap between phishing-resistant MFA (FIDO2, passkeys) and phishing-vulnerable MFA (TOTP, push notifications, SMS) is the difference between an authentication mechanism that defeats AiTM and one that does not.

The Conditional Access Gap

Microsoft Entra ID's Conditional Access policies can be configured to require compliant devices, specific network locations, or continuous access evaluation — all of which limit the attack surface for session token theft. The problem is that most mid-market Microsoft 365 tenants are not running Conditional Access at a maturity level that provides these protections. Conditional Access is included in Entra ID P1 licensing — which is included in Microsoft 365 Business Premium. Most organizations have the license. Most organizations have not implemented the policies. In our assessments, the most common finding is Conditional Access policies that exist but have exceptions that negate their effectiveness — service accounts excluded, legacy authentication protocols permitted, device compliance requirements applied only to named users rather than all users.

10 Minutes
The MGM Resorts breach began with a 10-minute LinkedIn research session and a phone call to the help desk. The attacker used social engineering to trigger an MFA reset — bypassing the entire authentication mechanism without touching a vulnerability or exploit tool. MGM's estimated breach cost exceeded $100 million.
0% of TOTP Codes
Zero percent of time-based one-time password codes provide protection against AiTM phishing. The code is valid regardless of whether it was entered on the legitimate site or an attacker's proxy. Only FIDO2 and device-bound passkeys have cryptographic origin binding that defeats AiTM.
47%
In Cloudskope's Microsoft 365 assessments of mid-market tenants, approximately 47% of organizations with Conditional Access policies enabled have at least one exception broad enough to negate the policy's intended protection — typically legacy authentication protocol exceptions or excluded service accounts with excessive permissions.

What to Do Right Now

The path from current MFA deployment to genuinely phishing-resistant authentication is a sequence of decisions requiring organizational change management alongside technical implementation. The first priority is eliminating SMS MFA for all accounts with administrative privileges. For privileged accounts — Global Administrators, Security Administrators, anyone with access to financial systems or sensitive data — SMS MFA is not an acceptable authentication mechanism in 2026.

The second priority is Conditional Access policy audit. If your organization has Entra ID P1 licensing and is not running a complete Conditional Access framework with device compliance requirements, you are not getting value from your Microsoft licensing investment. The policies should block legacy authentication protocols entirely, require compliant devices for all users accessing corporate data, and implement continuous access evaluation for high-privilege accounts.

The third priority is session lifetime review. Default Microsoft 365 session lifetimes run up to 90 days for persistent sessions. This is a 90-day window for a stolen session token to remain valid. For high-privilege accounts and accounts with access to sensitive data, session lifetimes should be significantly shorter and continuous access evaluation should be enabled.

The fourth priority is to stop framing MFA deployment as an endpoint. Organizations that completed MFA rollout in 2021 and moved on have a four-year-old security posture in a landscape that has changed entirely.

Conclusion

The MFA checkbox is checked. The board presentation said you deployed MFA. The cyber insurance questionnaire shows MFA enabled. None of that matters if your MFA implementation does not defend against AiTM phishing — which is the dominant credential attack technique in use today. The gap between MFA deployed and MFA that actually stops the attacks being used against you right now is the most dangerous gap in mid-market enterprise security.

CLOUDSKOPE VIEW

Cloudskope's Identity and Access Risk Assessment evaluates your MFA implementation against the five bypass techniques documented here — including a full Conditional Access policy review, legacy authentication protocol audit, and OAuth consent grant inventory. We identify the specific gaps in your authentication posture before an attacker does.