How cloud attackers are bypassing MFA and what you can do about it

Cover Image

Cloud security threats evolve with enterprise cloud adoption. Attackers use sophisticated methods to bypass protections:

• Social engineering campaigns use Adversary-in-the-Middle techniques to bypass multi-factor authentication by capturing session tokens
• SIM swapping attacks target SMS-based verification
• Poor credential storage creates vulnerabilities
• Post-compromise, attackers use native cloud tools like Azure Data Factory to exfiltrate data
• Threat actors create backdoors in cloud identity providers and deploy unmonitored VMs

Organizations can strengthen security by using phishing-resistant MFA like certificate-based authentication or FIDO2 keys and limiting access to trusted devices.

Vendor:
Amazon Web Services
Posted:
Apr 5, 2025
Published:
Apr 5, 2025
Format:
HTML
Type:
Analyst Report

Download Your Analyst Report Now!