"Moving to E5 has been really good from a security point of view... Now we can get a holistic view of whatโs going on, which helps us to make changes and recommendations for future plans."
IT Service Manager
Ian Harkess
Trusted by industry leaders
Kickstart Your FastTrack Journey
Fill out the short form below to express your interest in our FastTrack programme, and weโll be in touch soon.
Please note: A minimum of 150 enterprise licenses is required for FastTrack eligibility.
โWe needed to find solutions to a variety of issues whilst being a complex business, operating in a 24/7 environment. Stripe OLT listened and understood immediately the challenges we faced.โ
IT Operations Manager
Simon Darley
Trusted by industry leaders
Let's Talk
Call us on one of the numbers below, we cover the whole of the UK, so call the nearest office.
โWe needed to find solutions to a variety of issues whilst being a complex business, operating in a 24/7 environment. Stripe OLT listened and understood immediately the challenges we faced.โ
The Evolution of MFA: Why Traditional Authentication is Failing ย
Published: February 20, 2025
Expert: Sam Bracey
Role: SOC Team Lead
Specialises in: Security Operations
What you will learn:
Attackers have evolved past traditional MFA. This guide breaks down how they steal credentials using phishing, session hijacking, and MFA fatigue attacks. Youโll learn how these methods work and, most importantly, how to protect your business with phishing-resistant MFA solutions.
"Unfortunately, if you think an extra authentication step will keep your business safe, think again. Attackers are finding ways to harvest credentials and bypass MFA protections daily, and if your organisation isnโt deploying phishing-resistant MFA, or another form of check during sign-in, youโre at risk."
Having worked in a SOC for the last four years, Iโve seen firsthand the tactics Threat Actors use to bypass security measures. MFA was once considered the ultimate safeguard, but attackers have adapted, and traditional MFA alone is no longersufficient. Unfortunately, if you think an extra authentication step will keep your business safe, think again. Attackers are finding ways to harvest credentials and bypass MFA protections daily, and if your organisation isn’t deploying phishing-resistant MFA, or another form of check during sign-in, you’re at risk.
Why has this MFA evolution happened?
Cyber security is an infinite game – an arms race. Every time we create stronger authentication methods attackers develop new ways to undermine them. Traditional MFA, which relies on SMS-based codes or app-generated tokens, was effective when attackers primarily targeted passwords. However modern adversaries now leverage advanced phishing techniques, automation, and AI-driven social engineering to manipulate users.
In the below, I’ll break down how MFA credential theft can happen, the dangers it presents, and, most importantly, how to protect against it with phishing-resistant MFA solutions.
MFA Credential Stealing: How Attackers Bypass Authenticationย
What is MFA Credential Stealing?
MFA credential stealing involves an attacker finding a way to steal a session token that is accepted during the MFA check against a sign-in. Once this token has been stolen, it is then replayed and used to complete the MFA check. While MFA was once seen as a gold standard for protection, attackers have developed techniques to bypass it, exploiting human error, weak configurations, and vulnerabilities in authentication flows.
How Does It Work?
Hackers use several methods to steal MFA credentials, including:
Man-in-the-Middle (MitM) Attacks โ Adversary-in-the-middle (AiTM) phishing proxies steal authentication tokens by sitting between the user and the legitimate login page. An example of this might be:
Attackers deploy a phishing site that looks identical to Microsoft 365, tricking users into entering credentials, which are then forwarded to the real site while capturing session tokens. This method of stealing MFA tokens is becoming a regular occurrence, leaning on common tools developed by offensive security practitioners.
SIM Swapping โ Attackers clone a victimโs phone number to intercept SMS-based MFA codes.
MFA Fatigue Attacks โ Cybercriminals bombard users with repeated push notifications until they mistakenly approve access.
Session Hijacking โ Attackers steal active session cookies to bypass MFA entirely.
Example: Malicious JavaScript injects and extracts authentication cookies, allowing persistence.
Man in the Middle Attack
The Dangers of MFA Credential Theft
Once an attacker successfully bypasses MFA, they gain access to sensitive systems, allowing them to:
Sign in to accounts and steal valuable business data.
Move laterally within an organisation to escalate privileges.
Exploit weak authentication policies to evade detection.
Circumvent geolocation or device-based security controls.
Organisations relying on traditional MFA (e.g., SMS codes or one-time passwords) must recognise these risks and take action to adopt more resilient authentication methods.
Phishing-Resistant MFA: The Solutionย
To combat sophisticated MFA bypass techniques, organisations can force policies that deploy phishing-resistant MFA solutions. These methods are designed to prevent attacks by removing the reliance on easily compromised authentication factors.
Hardware Security Keys (FIDO2/WebAuthn)
Physical USB, NFC, or biometric-based keys that require direct possession.
Un-phishable authentication since credentials never leave the device.
Compatible with major identity platforms like Microsoft Entra ID and Google Workspace.
Passkeys (Passwordless Authentication)
Uses device-native biometrics like Face ID or Windows Hello.
No passwords or SMS codes that can be phished or stolen.
Enhanced user experience with faster and more secure logins.
Certificate-Based Authentication (CBA)
Cryptographic certificates replace passwords for stronger identity verification.
Ensures only trusted, enrolled devices can authenticate.
Commonly used in zero-trust environments.
More Advanced Options
Mutual TLS Authentication (mTLS) โ Requires both the client and server to authenticate each other via certificates.
Time-Based One-Time Password (TOTP) with Device Binding โ Ensuring OTPs can only be generated on pre-registered devices.
Behavioral Biometrics โ Monitors how users type, move their mouse, and interact with systems.
Enhancing MFA with Additional Security Layers
Implementing Three-Factor Authentication (3FA)
Combines three factors:
Something you know (password or PIN)
Something you have (security key)
Something you are (biometrics like fingerprints or facial recognition)
Implementing Conditional Access Policies
Geofencing โ Restrict authentication attempts to specific locations.
Device Trust โ Only allow access from corporate-managed devices.
Risk-Based Authentication โ Block access from unusual or high-risk login attempts.
Real-Time Monitoring & Response
For those that want to prioritise security, a Security Operations Centre (SOC) like the one we run at Stripe OLT, will detect and respond to unusual authentication behaviour in real-time. Including the ability to detect suspicious token use, or malformed browsers that can indicate an attempt to bypass security policies.
The Future of Phishing-Resistant Authenticationย
As cyber threats continue to evolve, authentication strategies will need to as well. In my opinion, future advancements include:
Decentralized Identity Solutions โ Using blockchain-based identity verification to eliminate passwords entirely.
AI-Driven Behavioural Authentication โ Analysing user behaviour patterns instead of static credentials for authentication.
Quantum-Safe Authentication โ Future-proofing authentication against quantum computing threats.
The main takeaway?ย
MFA credential stealing is a growing threat – we’re all talking about it. Leaders need to realise that traditional MFA methods are no longer sufficient to stop determined attackers. Organisations must adopt phishing-resistant MFA solutions such as hardware keys, passkeys, and certificate-based authentication. By combining these technologies with additional security layers like 3FA, conditional access policies, and real-time SOC monitoring, businesses can significantly reduce the risk of credential theft and unauthorised access.
This website uses cookies. By using this site you agree to our use of cookies. We use cookies to enhance your experience. To understand the specific cookies we use and how we handle your data, see out Cookie Policy, Privacy Policy and Terms & Conditions. Mange your preferences at any time by clicking the 'View Preferences' button.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.