Blog

How hackers bypass MFA – and what to do about it


Businesses have to be increasingly wary of an industry-wide shift in phishing tactics to get around multi-factor authentication (MFA). Attackers may use tactics such as adversary in the middle (AiTM) techniques to bypass security layers such as MFA.

AiTM attacks are an evolution of the man-in-the-middle (MiTM) technique, where cyber criminals intercept communications between two parties to steal sensitive data. In an AiTM attack, adversaries can also actively interfere with these communications, modifying the messages rather than simply relaying them. This can allow for a seamless MFA bypass.


Source link

Related Articles

Back to top button
close