Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityLogical Security

Reframing MFA Bypass: Four Identity Gaps Attackers Exploit

By Mouhamad Mbacke
Laptop in darkness
Hostaphoto via Unsplash
May 18, 2026

Cybersecurity analysts have popularized the term “multi-factor authentication (MFA) bypass.” It now appears regularly in threat reports, vendor pitches, board presentations, and analyst briefings.  

According to recent industry findings, nearly one in three incidents last year involved credential theft. Infostealer delivery increased 84% year over year, and adversary-in-the-middle (AiTM) phishing kits are now sold as turnkey services on the Dark Web. The common framing across these tactics is that attackers bypass MFA.

They usually do not.

A help desk agent who resets an authenticator after a social engineering call is not bypassing MFA. An infostealer that lifts a session cookie from a browser’s local storage has not defeated the second factor. A device code phishing campaign tricking a user into authorizing an attacker’s device through a legitimate flow has not broken MFA. In each case, MFA may have worked exactly as designed. The attacker operated on a surface that MFA was never built to protect.

That distinction matters because it shapes security investments. If you call session theft an MFA bypass, the response is to buy a stronger factor. If you call it what it is, a post-authentication detection gap, the response shifts to session monitoring, token binding, and continuous risk evaluation. The misnomer keeps MFA at the center of a problem it cannot solve alone. It also understates the role of identity threat detection and risk mitigation across the rest of the attack chain.

The Identity Lifecycle Is Where Mature Programs Still Lose

The FBI Cyber Podcast conversation with Mandiant Chief Technology Officer Charles Carmakal is unusually direct about how Scattered Spider and similar groups operate. Attackers call service desks, impersonate employees, and request MFA resets or credential recovery. The success of the campaign depends on whether the agent approves the request without proper identity verification.

In a well-run program, that call should trigger identity proofing at roughly the same assurance level as the original enrollment. In most programs, it triggers a knowledge-based question, manager approval, or a policy that weakens under the pressure of a live call. 

An authenticator is only as strong as the workflow that provisions it and the workflow that recovers it. Those workflows are usually less monitored and more forgiving than the login itself. Modern social engineering campaigns exploit that gap.

What the industry calls “MFA bypass” actually describes four distinct problems. Each requires more than MFA to defend.

1. Adversary-in-the-middle relay

AiTM phishing kits such as Tycoon 2FA proxy the user’s session through attacker infrastructure in real time. The user sees a legitimate login page, completes a real MFA prompt, and receives a valid session. The attacker captures the session token as it passes through the proxy. The factor worked as designed, but the session artifact was intercepted in transit.

Phishing-resistant factors that bind to the relying party’s origin can block this vector. These are specified in the World Wide Web Consortium (W3C) Web Authentication Level 3 and supported through Fast Identity Online (FIDO2) passkeys. They won’t authenticate against a spoofed origin. Even so, defenses should also include detection of anomalous token usage.

2. Session and token theft after authentication

A February 2026 Microsoft Security blog post shows infostealer threats are expanding rapidly. These threats target browser session cookies and authentication tokens across multiple environments. A replayed cookie can grant access without triggering an authentication event.

The defense operates at the session layer. It includes device-bound tokens, continuous access evaluation, and detection of sessions that originate from new networks or devices.

3. Identity lifecycle exploitation

The FBI’s January 2025 discussion with Mandiant describes Scattered Spider operators who socially engineer MFA resets and credential recovery through service desks. The authenticator is revoked and reissued to the wrong person through a trusted workflow. The defense belongs in the recovery process. It requires identity proofing at the same assurance level as initial enrollment, along with identity threat detection that correlates help desk activity to subsequent privilege changes.

4. Identity enrollment fraud

If an attacker compromises an email address or phone number long enough to intercept an enrollment link, they can register a phishing-resistant credential on their own device. The factor itself is strong, but it becomes useless once an attacker controls it. National Institute of Standards and Technology (NIST) Special Publication (SP) 800-63A defines identity assurance levels to address this risk. Proofing methods must scale with the impact of a false identity claim. Without sufficient identity proofing during enrollment, organizations build strong authentication on weak foundations.

Identity Threat Detection Across the Chain

So, what should organizations consider when addressing the MFA bypass myth?

Phishing-resistant MFA is highly effective at protecting the login event. It prevents credential replay, blocks spoofed domains, and raises the bar against phishing. But attackers have adapted. Instead of targeting authentication directly, they focus on everything around it, including session tokens, account recovery workflows, help desks, and enrollment processes. In many cases, MFA works exactly as designed. The compromise occurs after authentication or through trusted administrative paths.

So stronger authentication factors are not enough. They address part of the problem while leaving other areas exposed.

Identity threat detection and risk mitigation fills that gap. It extends identity security beyond the login event and identifies suspicious behavior across the entire identity lifecycle. This includes:

  • Session anomalies, such as tokens reused from new locations or infrastructure 
  • Unusual MFA resets or password recovery requests 
  • Privilege changes that follow help desk interactions 
  • New device enrollments or authentication methods added under risky conditions 

Rather than assuming that a successful login reflects a legitimate user, identity threat detection continuously evaluates risk. It correlates risk signals across systems and surfaces patterns that indicate account takeover, even when MFA has been satisfied.

The Bottom Line

In short, phishing-resistant MFA is necessary, but not sufficient to address MFA bypass attacks. Organizations need visibility and detection across the full identity lifecycle, because that is where attackers now operate.

KEYWORDS: identity identity challenges identity security multi-factor authentication

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Mouhamad mbacke headshot

Mouhamad Mbacke is an Identity Security Evangelist at ID Dataweb, where he specializes in translating complex identity security concepts into clear, actionable insights for security professionals. With a focus on emerging cyberthreats and the evolving importance of identity threat detection and risk mitigation in enterprise defense, Mouhamad helps organizations understand how identity-centric security strategies can address the growing sophistication of credential-based attacks, account takeover, and synthetic identity fraud. His work explores how adaptive identity proofing, real-time threat detection, and continuous risk assessment are reshaping enterprise approaches to access management and zero-trust architectures. Image courtesy of Mbacke

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Cybersecurity
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Person in red hoodie

When Metal Theft Becomes a Life Safety Crisis

Stacked books

Safe Learning 101 Program Supports Schools in Strengthening Campus Security

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

Two women consulting with a group in background

5 Skills That Will Serve You in Your Security Career

SEC 2026 Benchmark Banner

Events

May 21, 2026

From Referral to Response: Managing Domestic Violence Threats in the Workplace

Domestic violence remains a complex driver of workplace violence, creating high-risk scenarios that require coordination across departments without clear ownership. Learn how threat management teams can manage domestic violence referrals from the start.

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Related Articles

  • Figurines in a crowd with one standing apart

    When Employees Help Hackers: How Threat Actors Bypass MFA

    See More
  • Computer with a lock

    How attackers are pairing MFA manipulation & social engineering tricks

    See More
  • digital Trust freepik

    Attackers exploit zero-day flaws in Chrome, Safari and Internet Explorer

    See More

Related Products

See More Products
  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing