MFA Bypass: Attack Techniques and Defense Strategies

PUBlished on
February 4, 2026
|
updated on
February 13, 2026

Aman A.

September 15, 2022, 12:30 AM. An Uber contractor receives an MFA push notification. They decline it. Another notification. Decline. For over an hour, notifications arrive every few minutes. Exhausted and assuming a system glitch, they finally approve one. Within minutes, the attacker has access to Uber's internal systems, Slack, and source code repositories. The MFA worked exactly as designed. The human didn't.

Most organizations believe Multi-Factor Authentication (MFA) protects them from account compromise. In reality, MFA protects the authentication moment, not the session that follows. This distinction matters because attackers have shifted their focus from breaking MFA to bypassing it entirely through techniques that exploit human behavior, session management weaknesses, and the invisible layer of OAuth tokens that connect SaaS applications.

This guide explains how MFA bypass attacks work, why they succeed, and how security teams can detect and prevent them in modern SaaS environments.

Key Takeaways

MFA protects authentication, not what happens after - Attackers increasingly steal session tokens and OAuth refresh tokens that grant access without re-authentication

Nine primary bypass techniques dominate the threat landscape, from MFA fatigue attacks to adversary-in-the-middle (AiTM) proxies that capture tokens in real-time

AiTM attacks surged 146% in the past year, with nearly 40,000 incidents detected daily and eleven major phishing kits now circulating commercially

Behavioral detection reveals what authentication logs hide - Successful login events look identical whether legitimate or compromised; post-authentication behavior exposes the difference

Defense requires depth beyond MFA - Phishing-resistant authentication, OAuth governance, session monitoring, and legacy protocol blocking form essential layers

What is an MFA Bypass Attack?

An MFA bypass attack is any technique that allows an attacker to gain unauthorized access to an account or system despite the presence of multi-factor authentication controls. Rather than breaking the cryptographic mechanisms of MFA itself, these attacks exploit implementation weaknesses, human factors, session management gaps, and the architecture of modern authentication flows.

The uncomfortable truth: MFA protects the authentication moment, not the authenticated session. Once a user successfully authenticates with MFA, they receive session tokens, cookies, or OAuth tokens that grant ongoing access without requiring re-authentication. Attackers who steal or manipulate these post-authentication artifacts bypass MFA entirely.

Why Attackers Target MFA

MFA has become the last line of defense for most organizations. Passwords alone no longer suffice, and security teams have widely deployed MFA as the critical control preventing account takeover. This makes MFA the target attackers must defeat to achieve their objectives.

Consider the attacker's perspective: Breaking into systems through technical vulnerabilities requires specialized skills and often fails against patched, hardened infrastructure. Bypassing MFA through social engineering, token theft, or session hijacking works against the weakest link: human behavior and trust relationships between systems.

Identity-based attacks rose 32% in the first half of 2025, with more than 97% originating from large-scale password attacks that attempt to leverage stolen credentials against MFA-protected accounts. The attackers aren't trying to crack MFA codes. They're looking for the gaps around MFA where tokens live, humans make decisions, and legacy systems lack protection.

The Post-Authentication Reality

When a user successfully completes MFA, the authentication system issues tokens that prove the user's identity for a period of time. These include:

Each of these artifacts functions like a bearer token: whoever possesses it can use it. The token itself contains no biometric data, no second factor, no continuous verification that the person using it is the person who authenticated. This architectural reality creates the fundamental vulnerability that MFA bypass attacks exploit.

Understanding how session hijacking works helps security teams recognize why MFA alone cannot prevent account compromise in modern cloud environments.

Nine MFA Bypass Techniques Attackers Use in 2026

The landscape of MFA Bypass: Attack Techniques and Defense Strategies has evolved dramatically. Attackers now employ sophisticated methods that exploit both human psychology and technical architecture. Here are the nine most prevalent techniques security teams face today.

1. MFA Fatigue / Push Bombing

How it works: Attackers flood users with repeated MFA push notifications until the victim approves one out of frustration, confusion, or the assumption that the notifications represent a system error.

The Uber breach of 2022 demonstrated this technique's effectiveness. An attacker compromised a contractor's credentials and sent MFA push notifications continuously for over an hour. Eventually, the exhausted contractor approved one, granting the attacker access to Uber's internal systems, Slack channels, and source code repositories.

The Lapsus$ threat group repeatedly used MFA fatigue attacks throughout their 2022 campaign against Microsoft, Nvidia, Samsung, and other high-profile targets. They would initiate dozens or hundreds of push notifications while simultaneously contacting victims through other channels (phone calls, messages) claiming to be IT support who needed the user to approve the "system update" or "security verification."

Why it works: Humans are the weakest link. Push-based MFA relies on users making correct security decisions dozens or hundreds of times daily. Attackers only need them to make one mistake. The cognitive load of constant interruptions wears down even security-aware users.

2. Adversary-in-the-Middle (AiTM) Attacks

How it works: The attacker positions a proxy server between the victim and the legitimate authentication service. When users enter credentials and complete MFA, they authenticate to the real service through the attacker's proxy. The proxy captures the session token or cookie that results from successful authentication, then uses it to access the account directly.

AiTM attacks surged 146% in the past year, with nearly 40,000 incidents detected daily according to Microsoft's Digital Defense Report. Eleven major AiTM phishing kits now circulate commercially as Phishing-as-a-Service platforms, including Tycoon 2FA, EvilProxy, Mamba, and Evilginx2. Attackers can rent access to these platforms for a few hundred pounds per month.

The victim's experience appears completely normal: they visit what looks like their company's login page, enter credentials, complete MFA with their authenticator app or push notification, and successfully access their account. Behind the scenes, the attacker's proxy has captured the session cookie that proves authentication, allowing them to access the account from their own infrastructure without triggering additional MFA challenges.

MFA is "bypassed" by stealing what comes after authentication. The second factor worked perfectly. The session token simply doesn't require it again. Learn more about how attackers bypass email security using similar techniques.

3. SIM Swapping

How it works: Attackers convince mobile carriers to transfer a victim's phone number to a SIM card controlled by the attacker. Once the number is transferred, SMS-based MFA codes arrive on the attacker's device instead of the victim's.

SIM swapping requires social engineering of telecommunications employees. Attackers typically gather personal information about targets through reconnaissance, then contact carrier support claiming to have lost their phone and requesting a SIM transfer. Some attacks involve bribing or coercing carrier employees.

This technique works exclusively against SMS-based MFA. It has no effect on authenticator apps, hardware tokens, or push notifications tied to specific devices. However, SMS remains widely deployed as an MFA method, particularly for consumer accounts and legacy enterprise systems that haven't upgraded to more secure alternatives.

High-profile SIM swap attacks have targeted cryptocurrency investors, executives, and celebrities, resulting in millions of dollars in theft and unauthorized account access.

4. Session Hijacking / Cookie Theft

How it works: Attackers steal session tokens or cookies after a user successfully authenticates with MFA. These tokens grant access without requiring re-authentication, effectively bypassing MFA by using the artifact that proves authentication already occurred.

Multiple attack vectors enable session token theft:

Info-stealer malware has become particularly prevalent, with families like RedLine, Raccoon, and Vidar specifically designed to harvest browser cookies, saved passwords, and authentication tokens from infected systems. Once stolen, these tokens are sold on underground markets or used directly by attackers.

MFA protected the initial login. The attacker uses what that login produced. Understanding pass-the-cookie attacks reveals how session token theft enables persistent access.

5. Social Engineering Help Desks

How it works: Attackers impersonate legitimate users and contact IT help desks requesting MFA resets, claiming they've lost their device, changed phone numbers, or experienced other issues preventing authentication.

The MGM breach of 2023 demonstrated this technique's effectiveness. Attackers researched an employee on LinkedIn, called the Okta help desk impersonating that employee, and convinced help desk staff to reset MFA. Once MFA was removed from the account, the attackers logged in with compromised credentials and gained initial access that ultimately led to a ransomware attack costing MGM over $100 million.

Attackers frequently target help desk verification processes by:

Organizations with inconsistent help desk procedures, undertrained support staff, or weak verification requirements face particular risk from this bypass technique.

6. Exploiting Legacy Protocols

How it works: Older email protocols like IMAP, POP3, SMTP, and Exchange ActiveSync were designed before MFA existed and often don't support modern authentication methods. Attackers target these legacy endpoints directly, bypassing MFA entirely by using protocols that never required it.

This technique is particularly common in Microsoft 365 environments where organizations have not disabled basic authentication. Even when MFA is enforced for web-based access and modern authentication flows, legacy protocols may still accept username and password alone.

If basic authentication is allowed, MFA becomes irrelevant for attackers who know to target the right endpoint. They simply configure email clients or scripts to access accounts through legacy protocols using stolen credentials.

Microsoft has been gradually deprecating basic authentication across Microsoft 365, but many organizations have delayed enforcement due to compatibility concerns with legacy applications, devices, or workflows. Each delay extends the window of vulnerability.

7. Token Theft and Replay

How it works: Attackers steal OAuth tokens or session cookies from browsers, credential stores, code repositories, or network traffic, then replay them from attacker-controlled infrastructure to access APIs and services without re-authentication.

OAuth tokens bypass MFA entirely by design. When a user authorizes a third-party application through OAuth, they authenticate with MFA once. The OAuth token issued to that application works indefinitely (or until expiration) without requiring additional MFA. The token itself proves authorization; it doesn't care who uses it or from where.

The Salesloft-Drift incident demonstrated how OAuth token theft enables SaaS supply chain attacks. A compromised integration token granted access that extended through trusted connections into customer environments, affecting over 700 companies. The attackers never authenticated. They simply replayed stolen tokens.

Refresh tokens present particular risk because they persist longer than access tokens and can generate new access tokens without user interaction. These tokens often live in:

Once stolen, tokens enable attackers to act as the authorized application or user without triggering MFA, authentication logs, or traditional security controls. Learn more about OAuth token abuse and its implications for SaaS security.

8. Targeting Systems Without MFA

How it works: Attackers identify and exploit gaps in MFA coverage by finding systems, accounts, or access paths that lack multi-factor protection. The chain is only as strong as its weakest link.

Common gaps include:

The Snowflake data breaches of 2024 illustrated this vulnerability. Many customers had not enabled MFA on their data warehouse accounts, despite MFA being available. Attackers used stolen credentials to access accounts that lacked the protection most organizations assumed was universal.

Finding the gaps is often easier than bypassing MFA. Attackers perform reconnaissance to identify which systems, accounts, or access paths lack multi-factor protection, then focus their efforts accordingly.

9. Real-Time Phishing with OTP Relay

How it works: Attackers create phishing sites that capture credentials and one-time passwords simultaneously, then relay both to the legitimate service in real-time while the OTP remains valid.

This technique works even against time-based one-time passwords (TOTP) from authenticator apps. The attack flow:

  1. Victim receives phishing email and clicks link to fake login page
  2. Victim enters username and password on phishing site
  3. Attacker's backend immediately submits credentials to real service
  4. Real service responds with MFA challenge
  5. Phishing site displays identical MFA prompt to victim
  6. Victim enters OTP from authenticator app
  7. Attacker relays OTP to real service within validity window (typically 30-60 seconds)
  8. Real service grants access and issues session token
  9. Attacker captures session token for persistent access

This requires real-time coordination but modern phishing kits automate the entire process. Over 90% of credential compromise attacks are expected to involve sophisticated phishing kits by the end of 2026.

The attack succeeds because the OTP is valid when used. The victim authenticated to the real service through the attacker's proxy. From the service's perspective, authentication completed successfully with valid credentials and a correct second factor.

Why MFA Bypass Matters for SaaS Security

The shift to cloud-based SaaS applications has fundamentally changed where and how attackers operate. Understanding MFA Bypass: Attack Techniques and Defense Strategies in the SaaS context requires recognizing that modern attacks don't stop at authentication. They begin there.

Post-Authentication is Where Attackers Operate

MFA protects the front door. Attackers want what's behind the door: sensitive data, persistent access, lateral movement paths, and the ability to extend compromise across the SaaS supply chain.

Once inside an authenticated session, attackers can:

Traditional security controls often miss this activity because it occurs within authenticated sessions using valid credentials. The authentication logs show success. The session appears legitimate. Without behavioral context, you can't distinguish the attacker from the authorized user.

OAuth Tokens Bypass MFA Entirely

OAuth has become the standard for enabling integrations between SaaS applications. When users authorize third-party apps, they authenticate with MFA once. The OAuth token issued to that application works without requiring re-authentication, often for extended periods or indefinitely until revoked.

This architectural design creates a fundamental MFA bypass:

User authenticates with MFA OAuth token issued to third-party app Token works forever without MFA

The token itself becomes the authentication. It doesn't matter who uses it, from where, or for what purpose. The token proves authorization was granted. This is how SaaS-to-SaaS attacks propagate through trusted connections that quietly extend trust across organizational boundaries.

Consider the attack chain:

  1. Attacker compromises vendor's SaaS environment (often without MFA)
  2. Vendor has OAuth integrations with customer SaaS applications
  3. Attacker steals OAuth tokens from vendor environment
  4. Attacker replays tokens to access customer SaaS applications
  5. Customer's MFA is irrelevant; the token bypasses it
  6. Attacker moves laterally through customer's SaaS ecosystem

This is not theoretical. The Salesloft-Drift breach demonstrated exactly this pattern, with OAuth tokens enabling access that extended through trusted connections into over 700 customer environments.

The Detection Gap

MFA bypass is invisible in authentication logs. A successful authentication event looks identical whether the user or an attacker completed it. Traditional security tools that focus on authentication success/failure miss the critical context:

The attacker operates in blind spots between tools, using valid credentials, authenticated sessions, and trusted applications. Detection requires behavioral analysis of what happens after authentication, not just whether authentication succeeded.

Organizations need visibility into:

This is the hidden layer where attackers operate after bypassing MFA. Understanding SaaS-to-SaaS lateral movement helps security teams recognize how compromise extends beyond the initial entry point.

Detecting MFA Bypass Attacks

Authentication logs show success. Behavioral detection shows anomaly. The session after authentication reveals the attacker.

Traditional security tools focus on whether authentication succeeded or failed. This binary view misses the critical distinction between legitimate authenticated sessions and compromised ones. Both show successful authentication. The difference appears in what happens next.

Behavioral Signals of MFA Bypass

When attackers bypass MFA and gain access to accounts, their behavior differs from legitimate users in measurable ways:

Geographic and Network Anomalies

Device and Session Characteristics

Post-Authentication Security Changes

Data Access Patterns

Lateral Movement Indicators

Each of these signals individually might represent legitimate user behavior. The combination, timing, and context reveal compromise. An employee traveling for business might authenticate from a new location. An attacker who bypassed MFA will authenticate from a new location AND immediately create email forwarding rules AND access sensitive data they've never viewed AND authorize new OAuth apps.

What Traditional Security Misses

The detection gap exists because traditional tools lack the context to distinguish legitimate authenticated sessions from compromised ones:

SIEM (Security Information and Event Management)

CASB (Cloud Access Security Broker)

EDR (Endpoint Detection and Response)

MFA Logs

The attacker operates in the gaps between these tools, using valid credentials, authenticated sessions, and trusted applications. Detection requires a security approach that:

  1. Establishes behavioral baselines for each user, application, and integration
  2. Correlates activity across SaaS platforms to detect lateral movement
  3. Analyzes post-authentication behavior rather than just authentication success
  4. Identifies anomalies in context of normal patterns and peer groups
  5. Detects OAuth token abuse and integration-based attacks

Obsidian Security's approach uses behavioral detection and a Knowledge Graph that maps relationships between users, applications, OAuth tokens, and data access patterns. This enables detection of compromised sessions that traditional tools miss because they look only at authentication, not at the behavior that reveals compromise.

Understanding techniques of SaaS compromise helps security teams recognize the full attack lifecycle beyond initial access.

Moving Beyond MFA: Defense in Depth for SaaS

MFA is essential but not sufficient. Defense against MFA bypass requires multiple layers of control that address both the authentication moment and the session that follows.

1. Deploy Phishing-Resistant MFA

Not all MFA methods offer equal protection against bypass techniques. FIDO2 and passkeys eliminate entire categories of attacks:

Organizations should prioritize phishing-resistant MFA for high-risk accounts:

Where FIDO2 deployment faces obstacles, hardware tokens (like YubiKey) provide stronger protection than push notifications or SMS. Authenticator apps (TOTP) offer better security than SMS but remain vulnerable to real-time phishing with OTP relay.

2. Implement Conditional Access Policies

Conditional access adds context-aware controls that evaluate risk factors beyond authentication success:

These policies create defense in depth. Even if attackers bypass MFA, they face additional hurdles when accessing from non-compliant devices, unexpected locations, or untrusted networks.

3. Block Legacy Protocols

Disable basic authentication across all services:

Organizations should:

  1. Audit current usage of legacy protocols to identify dependencies
  2. Migrate applications to modern authentication methods
  3. Disable basic auth once migration complete
  4. Monitor for attempted use of blocked protocols

Microsoft provides tools to identify and disable basic authentication in Microsoft 365. Similar controls exist for other SaaS platforms. The operational burden of migration is far less than the security risk of leaving legacy protocols enabled.

4. Monitor Sessions, Not Just Authentication

Behavioral detection reveals what authentication logs hide. Security teams need visibility into:

This requires security tools that:

Traditional SIEM and CASB tools lack this context. SaaS security platforms like Obsidian provide the behavioral detection and cross-application visibility needed to identify compromised sessions.

5. Govern OAuth and Integration Tokens

OAuth tokens bypass MFA by design. Governance requires:

Organizations should:

  1. Inventory OAuth apps across all SaaS platforms
  2. Classify by risk based on permissions, data access, and vendor trustworthiness
  3. Revoke unused or high-risk apps that don't serve business purposes
  4. Monitor token usage for geographic, temporal, or volumetric anomalies
  5. Implement approval workflows for new OAuth app authorizations

Understanding OAuth security and token management is critical for preventing SaaS supply chain attacks.

6. Strengthen Help Desk Verification

Social engineering of help desks enables MFA bypass. Stronger identity proofing prevents this:

Organizations should:

The MGM breach demonstrated the cost of weak help desk verification. Investment in identity proofing procedures pays dividends in preventing social engineering-based MFA bypass.

Detect MFA Bypass Before Attackers Move Laterally

Attackers who bypass MFA look like legitimate users in your authentication logs. The difference appears in what happens next: unusual data access, new OAuth apps, email rules forwarding sensitive

Frequently Asked Questions (FAQs)

What is an MFA bypass attack and how does it work?

An MFA bypass attack is any technique that allows attackers to gain unauthorized access despite multi-factor authentication being enabled. Attackers don't crack MFA—they route around it by stealing session tokens, OAuth refresh tokens, or exploiting human behavior through techniques like MFA fatigue, where users approve requests after being bombarded with prompts.

What are the most common MFA bypass techniques used by attackers?

Nine primary techniques dominate: MFA fatigue attacks (push notification bombing), adversary-in-the-middle (AiTM) phishing that captures tokens in real-time, session token theft, OAuth token compromise, SIM swapping, social engineering help desks, exploiting legacy protocols that don't support MFA, real-time phishing proxies, and authorization code interception.

Why have adversary-in-the-middle (AiTM) attacks increased?

AiTM attacks surged 146% in the past year, with nearly 40,000 incidents detected daily. Eleven major phishing kits now circulate commercially, enabling attackers to intercept authentication tokens in real-time as users complete legitimate MFA challenges. The victim authenticates normally while the attacker captures the resulting session token.

How can organizations defend against MFA bypass attacks?

Defense requires depth beyond MFA: implement phishing-resistant authentication like FIDO2/WebAuthn, establish OAuth governance to control token issuance, monitor session behavior for anomalies, block legacy protocols that bypass MFA, and deploy behavioral detection that identifies post-authentication abuse rather than relying solely on authentication event logs.

You May Also Like

Get Started

Start in minutes and secure your critical SaaS applications with continuous monitoring and data-driven insights.

get a demo