{"id":25859,"date":"2022-11-22T14:35:00","date_gmt":"2022-11-22T14:35:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=25859"},"modified":"2023-03-01T21:40:03","modified_gmt":"2023-03-01T21:40:03","slug":"token-theft-bypassing-mfa","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/token-theft-bypassing-mfa\/","title":{"rendered":"Microsoft Warns of Surge in Token Theft, Bypassing MFA"},"content":{"rendered":"\n<p>The Microsoft Detection and Response Team (DART) recently warned that attackers are increasingly using token theft to circumvent <a href=\"https:\/\/www.esecurityplanet.com\/applications\/mfa-advantages-and-weaknesses\/\" target=\"_blank\" rel=\"noreferrer noopener\">multi-factor authentication (MFA)<\/a>.<\/p>\n\n\n\n<p>&#8220;By compromising and replaying a token issued to an identity that has already completed multifactor authentication, the threat actor satisfies the validation of MFA and access is granted to organizational resources accordingly,&#8221; the team wrote in a <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/11\/16\/token-tactics-how-to-prevent-detect-and-respond-to-cloud-token-theft\/\" target=\"_blank\" rel=\"noreferrer noopener\">blog post<\/a>.<\/p>\n\n\n\n<p>That&#8217;s particularly concerning, they noted, because the attack technique doesn&#8217;t require significant expertise, it&#8217;s difficult to detect, and few organizations are watching out for it.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">AitM and Pass-the-Cookie Attacks<\/h2>\n\n\n\n<p>The two leading methods of token theft observed by DART are adversary-in-the-middle (AitM) frameworks and pass-the-cookie attacks.<\/p>\n\n\n\n<p>In the case of AitM, the team warned, &#8220;Frameworks like Evilginx2 go far beyond credential <a href=\"https:\/\/www.esecurityplanet.com\/threats\/phishing-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">phishing<\/a>, by inserting malicious infrastructure between the user and the legitimate application the user is trying to access. When the user is phished, the malicious infrastructure captures both the credentials of the user and the token.&#8221;<\/p>\n\n\n\n<p>Depending on the privileges of the victim, the result can range from business email compromise (BEC) to total takeover of administrative control.<\/p>\n\n\n\n<p>Pass-the-cookie attacks involve the <a href=\"https:\/\/www.esecurityplanet.com\/threats\/hackers-steal-session-cookies-to-bypass-mfa\/\" target=\"_blank\" rel=\"noreferrer noopener\">compromise of browser cookies<\/a> to access corporate resources. &#8220;After authentication to Azure AD via a browser, a cookie is created and stored for that session,&#8221; the team noted. &#8220;If an attacker can compromise a device and extract the browser cookies, they could pass that cookie into a separate web browser on another system, bypassing security checkpoints along the way.&#8221;<\/p>\n\n\n\n<p>That&#8217;s a particular concern for personal devices. As more and more employees work remotely, DART warned, employees are increasingly accessing corporate resources from devices that lack strong security controls.<\/p>\n\n\n\n<p>&#8220;Users on these devices may be signed into both personal websites and corporate applications at the same time, allowing attackers to compromise tokens belonging to both,&#8221; they wrote.<\/p>\n\n\n\n<p>Commodity malware like Emotet, Redline, and IcedID all have built-in functionality to exfiltrate browser cookies. What&#8217;s more, DART noted, &#8220;the attacker does not have to know the compromised account password or the email address for this to work \u2013 those details are held within the cookie.&#8221;<\/p>\n\n\n\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/applications\/passwordless-challenges\/\" target=\"_blank\" rel=\"noreferrer noopener\">The Challenges Facing the Passwordless Future<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to Respond to Token Theft<\/h2>\n\n\n\n<p>Key mitigations, according to DART, include maintaining full visibility into how and where all users are authenticating.<\/p>\n\n\n\n<p>&#8220;Allowing only known devices that adhere to Microsoft&#8217;s recommended security baselines helps mitigate the risk of commodity credential theft malware being able to compromise end-user devices,&#8221; they wrote.<\/p>\n\n\n\n<p>For unmanaged devices, DART recommends reducing the lifetime of each session to shorten the length of time a given token is viable and implementing Conditional Access App Control in Microsoft Defender for Cloud Apps.<\/p>\n\n\n\n<p>For highly privileged users, DART also advises implementing <a href=\"https:\/\/www.esecurityplanet.com\/applications\/microsoft-expands-passwordless-sign-on-to-all-accounts\/\" target=\"_blank\" rel=\"noreferrer noopener\">phishing-resistant MFA solutions<\/a> like FIDO2 security keys, Windows Hello for Business, or certificate-based authentication. Such users should also have a segregated cloud-only identity for admin activities.<\/p>\n\n\n\n<p>If a user is compromised, DART noted, Azure AD provides the capability to revoke a refresh token, forcing the user to re-authenticate \u2013 though the token can still remain valid for up to an hour, giving the attacker access to the account until it expires.<\/p>\n\n\n\n<p>DART also recommends checking any compromised user&#8217;s account for signs of persistence, such as added mailbox rules to forward or hide email, additional authentication methods added to MFA, additional device enrollment, and data exfiltration.<\/p>\n\n\n\n<p>&#8220;Having visibility, alerting, insights, and a full understanding of where security controls are enforced is key,&#8221; the team wrote. &#8220;Treating both identity providers that generate access tokens and their associated privileged identities as critical assets is strongly encouraged.&#8221;<\/p>\n\n\n\n<p>Want to make sure attackers aren&#8217;t bypassing MFA in your organization? Rapid7&#8217;s extended detection and response (XDR) platform can help you protect your organization from unauthorized access and data breaches. <strong><a href=\"https:\/\/www.rapid7.com\/services\/managed-services\/managed-detection-and-response-services\/pricing\/elite-request\/?utm_medium=3email&amp;utm_source=tec&amp;utm_content=mdrcontactus&amp;utm_campaign=nagrth-bau_any-3email-cmmrcl-mdr-na&amp;utm_meta=a1286\" target=\"_blank\" rel=\"noopener sponsored nofollow\">Speak to an expert<\/a> today.<\/strong><\/p>\n\n\n\n<p><em>Read next:<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-password-managers\/\"><em><strong>Top Password Managers<\/strong><\/em><\/a><\/p>\n\n\n\n<p><em><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-iam-software\/\"><strong>Top Identity &amp; Access Management tools<\/strong><\/a><\/em><\/p>\n\n\n<div id=\"ta-campaign-widget-66d7086dc9909-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d7086dc9909\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d7086dc9909\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d7086dc9909\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d7086dc9909\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d7086dc9909\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d7086dc9909\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The Microsoft Detection and Response Team (DART) recently warned that attackers are increasingly using token theft to circumvent multi-factor authentication (MFA). &#8220;By compromising and replaying a token issued to an identity that has already completed multifactor authentication, the threat actor satisfies the validation of MFA and access is granted to organizational resources accordingly,&#8221; the team [&hellip;]<\/p>\n","protected":false},"author":166,"featured_media":25861,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[2369,31948,3790,1146,31963,532,3414,730,5277],"b2b_audience":[33,35],"b2b_industry":[],"b2b_product":[382,384,31781,381,31789,31775,392],"class_list":["post-25859","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-cloud-security","tag-credential-theft","tag-cybersecurity","tag-malware","tag-mfa","tag-microsoft","tag-network-security","tag-security","tag-web-security","b2b_audience-awareness-and-consideration","b2b_audience-implementation-and-support","b2b_product-application-security-vulnerability-management","b2b_product-identity-management-privacy","b2b_product-multi-factor-access-management","b2b_product-network-access-control-nac","b2b_product-phishing-and-spear-phishing","b2b_product-web-applications-security","b2b_product-web-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Microsoft Warns of Surge in Token Theft, Bypassing MFA | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"Hackers are stealing tokens after multi-factor authentication has been granted, Microsoft researchers have found.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/token-theft-bypassing-mfa\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft Warns of Surge in Token Theft, Bypassing MFA | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"Hackers are stealing tokens after multi-factor authentication has been granted, Microsoft researchers have found.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/token-theft-bypassing-mfa\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-22T14:35:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-01T21:40:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/Cloud-token-theft_3_Adversary-in-the-Middle-attack-flowchart-e1669081573835.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"469\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jeff Goldman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Goldman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/token-theft-bypassing-mfa\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/token-theft-bypassing-mfa\/\"},\"author\":{\"name\":\"Jeff Goldman\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795\"},\"headline\":\"Microsoft Warns of Surge in Token Theft, Bypassing MFA\",\"datePublished\":\"2022-11-22T14:35:00+00:00\",\"dateModified\":\"2023-03-01T21:40:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/token-theft-bypassing-mfa\/\"},\"wordCount\":651,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/token-theft-bypassing-mfa\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/Cloud-token-theft_3_Adversary-in-the-Middle-attack-flowchart-e1669081573835.png\",\"keywords\":[\"cloud security\",\"credential theft\",\"cybersecurity\",\"malware\",\"mfa\",\"Microsoft\",\"network security\",\"security\",\"Web security\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/token-theft-bypassing-mfa\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/token-theft-bypassing-mfa\/\",\"name\":\"Microsoft Warns of Surge in Token Theft, Bypassing MFA | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/token-theft-bypassing-mfa\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/token-theft-bypassing-mfa\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/Cloud-token-theft_3_Adversary-in-the-Middle-attack-flowchart-e1669081573835.png\",\"datePublished\":\"2022-11-22T14:35:00+00:00\",\"dateModified\":\"2023-03-01T21:40:03+00:00\",\"description\":\"Hackers are stealing tokens after multi-factor authentication has been granted, Microsoft researchers have found.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/token-theft-bypassing-mfa\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/token-theft-bypassing-mfa\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/token-theft-bypassing-mfa\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/Cloud-token-theft_3_Adversary-in-the-Middle-attack-flowchart-e1669081573835.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/Cloud-token-theft_3_Adversary-in-the-Middle-attack-flowchart-e1669081573835.png\",\"width\":1000,\"height\":469,\"caption\":\"aitm mfa attack\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/token-theft-bypassing-mfa\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft Warns of Surge in Token Theft, Bypassing MFA\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795\",\"name\":\"Jeff Goldman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg\",\"caption\":\"Jeff Goldman\"},\"description\":\"eSecurity Planet contributor Jeff Goldman has been a technology journalist for more than 20 years and an eSecurity Planet contributor since 2009. He's also written extensively about wireless and broadband infrastructure and semiconductor engineering. He started his career at MTV, but soon decided that technology writing was a more promising path.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jeff-goldman\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft Warns of Surge in Token Theft, Bypassing MFA | eSecurity Planet","description":"Hackers are stealing tokens after multi-factor authentication has been granted, Microsoft researchers have found.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/token-theft-bypassing-mfa\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft Warns of Surge in Token Theft, Bypassing MFA | eSecurity Planet","og_description":"Hackers are stealing tokens after multi-factor authentication has been granted, Microsoft researchers have found.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/token-theft-bypassing-mfa\/","og_site_name":"eSecurity Planet","article_published_time":"2022-11-22T14:35:00+00:00","article_modified_time":"2023-03-01T21:40:03+00:00","og_image":[{"width":1000,"height":469,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/Cloud-token-theft_3_Adversary-in-the-Middle-attack-flowchart-e1669081573835.png","type":"image\/png"}],"author":"Jeff Goldman","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jeff Goldman","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/token-theft-bypassing-mfa\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/token-theft-bypassing-mfa\/"},"author":{"name":"Jeff Goldman","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795"},"headline":"Microsoft Warns of Surge in Token Theft, Bypassing MFA","datePublished":"2022-11-22T14:35:00+00:00","dateModified":"2023-03-01T21:40:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/token-theft-bypassing-mfa\/"},"wordCount":651,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/token-theft-bypassing-mfa\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/Cloud-token-theft_3_Adversary-in-the-Middle-attack-flowchart-e1669081573835.png","keywords":["cloud security","credential theft","cybersecurity","malware","mfa","Microsoft","network security","security","Web security"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/token-theft-bypassing-mfa\/","url":"https:\/\/www.esecurityplanet.com\/threats\/token-theft-bypassing-mfa\/","name":"Microsoft Warns of Surge in Token Theft, Bypassing MFA | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/token-theft-bypassing-mfa\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/token-theft-bypassing-mfa\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/Cloud-token-theft_3_Adversary-in-the-Middle-attack-flowchart-e1669081573835.png","datePublished":"2022-11-22T14:35:00+00:00","dateModified":"2023-03-01T21:40:03+00:00","description":"Hackers are stealing tokens after multi-factor authentication has been granted, Microsoft researchers have found.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/token-theft-bypassing-mfa\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/token-theft-bypassing-mfa\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/token-theft-bypassing-mfa\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/Cloud-token-theft_3_Adversary-in-the-Middle-attack-flowchart-e1669081573835.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/Cloud-token-theft_3_Adversary-in-the-Middle-attack-flowchart-e1669081573835.png","width":1000,"height":469,"caption":"aitm mfa attack"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/token-theft-bypassing-mfa\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Microsoft Warns of Surge in Token Theft, Bypassing MFA"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795","name":"Jeff Goldman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg","caption":"Jeff Goldman"},"description":"eSecurity Planet contributor Jeff Goldman has been a technology journalist for more than 20 years and an eSecurity Planet contributor since 2009. He's also written extensively about wireless and broadband infrastructure and semiconductor engineering. He started his career at MTV, but soon decided that technology writing was a more promising path.","url":"https:\/\/www.esecurityplanet.com\/author\/jeff-goldman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/25859"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/166"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=25859"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/25859\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/25861"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=25859"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=25859"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=25859"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=25859"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=25859"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=25859"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}