Understanding MFA bypass attacks: How attackers use AiTM techniques

Cover Image

Multi-factor authentication (MFA) is increasingly bypassed through sophisticated adversary-in-the-middle (AiTM) phishing attacks, according to Mandiant research. These attacks use web proxies to intercept passwords, MFA codes, and session tokens.

Key insights include:

· Common MFA methods like push notifications and one-time passwords are vulnerable to AiTM attacks
· FIDO2/U2F hardware keys and certificate-based authentication offer better protection
· Detection opportunities exist in monitoring IP address anomalies and new MFA enrollments
· Effective defense requires phishing-resistant MFA and evaluated access policies

To learn more about evolving AiTM threats, read the full research content.

Vendor:
Amazon Web Services
Posted:
Apr 5, 2025
Published:
Apr 5, 2025
Format:
HTML
Type:
Research Content

Download Your Research Content Now!