How Cybercriminals Evade MFA Using AiTM Techniques
Written on
Chapter 1: Understanding Multi-Factor Authentication
In today’s digital landscape, multi-factor authentication (MFA) has become a fundamental aspect of cybersecurity strategies. This method adds a layer of verification to ensure that the individual attempting to access a network is legitimate. While MFA enhances security, cybercriminals have found ways to circumvent these defenses.
MFA is designed to prevent unauthorized access by requiring additional information beyond just a password. Typically, this involves receiving a text message, using a code from an authenticator app, or utilizing a physical security key. However, if the password is the sole barrier, it poses a significant risk since it can be easily compromised.
Section 1.1: The Evolving Threat Landscape
Recent trends in cyberattacks illustrate how hackers are increasingly able to bypass MFA systems. According to threat data from Microsoft, adversary-in-the-middle (AiTM) phishing has targeted over 10,000 organizations since September 2021. Phishing remains one of the most common techniques employed by cybercriminals to gain unauthorized access.
“Even though security features like multi-factor authentication (MFA) add an extra layer of security, they should not be considered a foolproof solution against phishing attacks. With the utilization of sophisticated phishing kits (AiTM) and clever evasion tactics, threat actors can circumvent both basic and advanced security measures,”
~ Cybersecurity Company Zscaler
Section 1.2: How AiTM Phishing Works
AiTM phishing operates by enabling attackers to steal not just passwords but also session cookies. Rather than directly breaking down the MFA, AiTM stealthily captures the session cookie, allowing attackers to return later without raising suspicion. This creates a significant vulnerability, even in systems protected by MFA.
How Hackers Bypass MFA! - (Multi-Factor Authentication) - YouTube
In this video, we dive deeper into how hackers exploit vulnerabilities in MFA and the methods they use to bypass it.
Chapter 2: The Mechanisms of AiTM
The mechanics of AiTM phishing involve intercepting authentication processes. By creating a web server that proxies HTTP packets, attackers can impersonate legitimate websites. This allows them to manipulate user authentication seamlessly.
The AiTM phishing site captures the entire authentication exchange, extracting critical information such as passwords and session cookies. Once the session cookie is in the hands of the attackers, they can inject it into their browser, effectively bypassing the MFA.
AiTM ATTACK: How to Bypass any MFA and the Steps You Can Take to Protect Your Business (EN version) - YouTube
This video discusses the AiTM attack methodology and provides insights on how businesses can safeguard themselves against these sophisticated threats.
Top 11 Malware Strains of 2021
A collaborative advisory from American and Australian cybersecurity agencies has detailed the leading malware strains currently threatening organizations and strategies for mitigation.
The AiTM phishing process can be automated through open-source phishing toolkits such as Evilginx2, Modlishka, and Muraena. Microsoft 365 Defender has reported multiple instances of AiTM phishing campaigns, particularly targeting Office 365 users by mimicking the online authentication page.
For a comprehensive report, refer to the findings from the Microsoft 365 Defender Research Team.