Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityCybersecurity News

Tips to overcome the limitations of MFA

By Perry Carpenter
cybersecurity-freepik1170x658.jpg

Image by Freepik

January 3, 2023

Recent surveys indicate nearly 74% of organizations plan to increase their spending on multifactor authentication (MFA) initiatives. That’s a good thing, given that about 80% of security breaches are the result of credential theft. MFA adds a few additional layers of credentials to the authentication process, such as device tokens, OTPs (one-time passwords), and/or biometrics. This way, attackers can’t launch an attack simply through hacked passwords. 

Having said that, MFA is not inviolable. You can’t just deploy MFA and walk away. With a few extra tricks and steps, sophisticated threat actors can circumvent MFA. Below are a few common MFA pitfalls attackers can take advantage of:

  • Attackers can steal “what you have”

MFA often involves a “what you have” factor, in addition to passwords. For instance, it can be paired with a mobile device or a phone number through which users receive their passcodes. If someone’s device is stolen or the victim of a SIMcloning attack, the attacker may gain access to the other critical piece needed to impersonate the owner and access their personal accounts and work-related apps unabated. The attacker can gain an entry point to corporate networks and move laterally across the network as an authenticated user. 

  • MitM (man-in-the-middle) attacks bypass MFA

MitM attacks are those in which malicious actors intercept the victim’s network connection to sniff their data. They can capture the OTP in transit and replay it as-is to authenticate as legitimate users. They can also steal session cookies and hijack a session right after users authenticate themselves via MFA. From there onwards, the attackers enjoy all the privileges of their victims. 

  •      Anti-MFA phishing attacks are on the rise

Attackers often get around sophisticated cyber controls through phishing and highly targeted spear-phishing. For instance, a proof-of-concept phishing technique sparked a discussion earlier this year. It used a phishing email to lure unsuspecting employees into clicking a seemingly legitimate login link that would, in fact, launch a remote session and redirect the victim to the attacker’s browser. The victim would then enter MFA credentials on the log-in page opened in the attacker’s browser. After that, the attacker could cut off the remote session and assume control of the victim’s account. 

Another phishing technique involves sending excessive push notifications to the victim’s device to create MFA fatigue. The user, getting irked by the constant prompts, bypasses the MFA and unknowingly grants access to the attackers. 

  • MFA isn’t vulnerability-proof

Like all software, MFA solutions and products are prone to unknown zero-days and unpatched vulnerabilities. For instance, attackers have notoriously exploited the self-enrollment process of applying MFA to Microsoft Azure AD. They simply compromise account credentials and enroll their own devices before legitimate users can. This way, they assume complete control of the victim’s Office365 accounts. 

How Organizations Can Overcome MFA Limitations

Organizations need MFA as part of their cybersecurity strategy. But relying on it as a panacea would be a grave mistake. Organizations still need a comprehensive cybersecurity strategy in addition to a robust technology stack to combat and mitigate threats when MFA fails. 

Here are a few strategies organizations can implement to improve their security posture in the wake of anti-MFA attacks:

  • Adopt Phishing-Resistant MFA

Phishing-resistant MFA overcomes most, if not all, flaws and limitations of legacy MFA. Instead of sending secret passwords or OTPs over a network connection, where attackers can simply intercept and replay them, it verifies the user locally through well-implemented public-key cryptography. 

Organizations can choose solutions that incorporate a biometric factor into the authentication process. Even if an attacker gains access to a verified device, the additional biometric verification adds another layer of protection against unauthorized access. Bear in mind that even sophisticated MFA solutions are prone to zero-days and insider attacks. 

  • Implement a Zero-Trust Strategy

A zero-trust policy is based on the principle: trust no one; verify everyone. It implements the principle of least privilege, which means users can only access the data and resources they absolutely need to perform their jobs. A zero-trust strategy mitigates the risks associated with MFA hacks by preventing attackers from laterally moving across the network to access other critical assets.

Zero-trust solutions utilize contextual awareness and telemetry data for continuous authentication of users even when they are already inside the corporate network. It means, if an attacker manages to compromise MFA or a malicious insider initiates suspicious activities, the zero-trust model will evaluate their access requests based on contextual data, such as device posture, location, user’s typical behavioral patterns, and more. It will only be a matter of time before network monitoring generates alerts. 

  • Conduct Cybersecurity Awareness Training

Employees' cybersecurity awareness must be an integral, ongoing part of organizations’ overall cybersecurity strategy. With increasing MFA fatigue that compels employees to overlook or get around security policies, it is necessary to educate them about the gravity, prevalence and implications of modern-day cyber threats and the necessity of these seemingly excessive security measures and strict acceptable use policies (AUP).

Phishing has to be one of the most common attack vectors used to bypass MFA. Luckily, even the most legitimate-looking spear-phishing emails will have dead giveaways such as an urgent call-to-action or mismatched URLs. It should become routine for all employees to suspect each email and take safety precautions such as double-checking the sender and verifying URLs. Organizations can achieve such vigilance through continuous training and unannounced simulated phishing exercises. 

MFA is essential. Nevertheless, security teams cannot dismiss the idea of a highly motivated threat actor compromising even the most sophisticated MFA system. Instead of looking for a panacea, organizations need a comprehensive, multi-layered security program that relies on zero-trust access and well-aware, well-trained employees who understand the stakes and act responsibly.

KEYWORDS: cyber security information security risk management security operations

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Perry carpenter

Perry Carpenter is author of Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors (Wiley, 2019). Working with noted hacker Kevin Mitnick, he is Chief Evangelist/ Strategy Officer for KnowBe4, developer of security awareness training and simulated phishing platforms with over 30,000 customers and 2 million users. He holds a MS in Information Assurance (MSIA) from Norwich University and is a Certified Chief Information Security Officer (C|CISO).

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • security awareness freepik

    Building a culture of cybersecurity: 3 key takeaways from the 2021 SANS report

    See More
  • employee-training-freepik58365.jpg

    Try creating employee personas to customize your security communications efforts

    See More
  • Employees gathering

    How to effectively communicate cybersecurity best practices to staff

    See More

Related Products

See More Products
  • databasehacker

    The Database Hacker's Handboo

See More Products

Events

View AllSubmit An Event
  • March 6, 2025

    Why Mobile Device Response is Key to Managing Data Risk

    ON DEMAND: Most organizations and their associating operations have the response and investigation of computers, cloud resources, and other endpoint technologies under lock and key. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!