SHARE
Facebook X Pinterest WhatsApp

Microsoft Warns of Surge in Token Theft, Bypassing MFA

The Microsoft Detection and Response Team (DART) recently warned that attackers are increasingly using token theft to circumvent multi-factor authentication (MFA). “By compromising and replaying a token issued to an identity that has already completed multifactor authentication, the threat actor satisfies the validation of MFA and access is granted to organizational resources accordingly,” the team […]

Written By
thumbnail Jeff Goldman
Jeff Goldman
Nov 22, 2022
eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

The Microsoft Detection and Response Team (DART) recently warned that attackers are increasingly using token theft to circumvent multi-factor authentication (MFA).

“By compromising and replaying a token issued to an identity that has already completed multifactor authentication, the threat actor satisfies the validation of MFA and access is granted to organizational resources accordingly,” the team wrote in a blog post.

That’s particularly concerning, they noted, because the attack technique doesn’t require significant expertise, it’s difficult to detect, and few organizations are watching out for it.

The two leading methods of token theft observed by DART are adversary-in-the-middle (AitM) frameworks and pass-the-cookie attacks.

In the case of AitM, the team warned, “Frameworks like Evilginx2 go far beyond credential phishing, by inserting malicious infrastructure between the user and the legitimate application the user is trying to access. When the user is phished, the malicious infrastructure captures both the credentials of the user and the token.”

Depending on the privileges of the victim, the result can range from business email compromise (BEC) to total takeover of administrative control.

Pass-the-cookie attacks involve the compromise of browser cookies to access corporate resources. “After authentication to Azure AD via a browser, a cookie is created and stored for that session,” the team noted. “If an attacker can compromise a device and extract the browser cookies, they could pass that cookie into a separate web browser on another system, bypassing security checkpoints along the way.”

That’s a particular concern for personal devices. As more and more employees work remotely, DART warned, employees are increasingly accessing corporate resources from devices that lack strong security controls.

“Users on these devices may be signed into both personal websites and corporate applications at the same time, allowing attackers to compromise tokens belonging to both,” they wrote.

Commodity malware like Emotet, Redline, and IcedID all have built-in functionality to exfiltrate browser cookies. What’s more, DART noted, “the attacker does not have to know the compromised account password or the email address for this to work – those details are held within the cookie.”

Also read: The Challenges Facing the Passwordless Future

How to Respond to Token Theft

Key mitigations, according to DART, include maintaining full visibility into how and where all users are authenticating.

“Allowing only known devices that adhere to Microsoft’s recommended security baselines helps mitigate the risk of commodity credential theft malware being able to compromise end-user devices,” they wrote.

For unmanaged devices, DART recommends reducing the lifetime of each session to shorten the length of time a given token is viable and implementing Conditional Access App Control in Microsoft Defender for Cloud Apps.

For highly privileged users, DART also advises implementing phishing-resistant MFA solutions like FIDO2 security keys, Windows Hello for Business, or certificate-based authentication. Such users should also have a segregated cloud-only identity for admin activities.

If a user is compromised, DART noted, Azure AD provides the capability to revoke a refresh token, forcing the user to re-authenticate – though the token can still remain valid for up to an hour, giving the attacker access to the account until it expires.

DART also recommends checking any compromised user’s account for signs of persistence, such as added mailbox rules to forward or hide email, additional authentication methods added to MFA, additional device enrollment, and data exfiltration.

“Having visibility, alerting, insights, and a full understanding of where security controls are enforced is key,” the team wrote. “Treating both identity providers that generate access tokens and their associated privileged identities as critical assets is strongly encouraged.”

Want to make sure attackers aren’t bypassing MFA in your organization? Rapid7’s extended detection and response (XDR) platform can help you protect your organization from unauthorized access and data breaches. Speak to an expert today.

Read next:

Top Password Managers

Top Identity & Access Management tools

thumbnail Jeff Goldman

eSecurity Planet contributor Jeff Goldman has been a technology journalist for more than 20 years and an eSecurity Planet writer since 2009. He's also written extensively about wireless and broadband infrastructure and semiconductor engineering. He started his career at MTV, but soon decided that technology writing was a more promising path.

Recommended for you...

LayerX Exposes Critical Flaw in OpenAI’s ChatGPT Atlas Browser
Ken Underhill
Oct 28, 2025
AI Misfire: Teen Handcuffed After AI Mistakes Doritos for Gun
Ken Underhill
Oct 28, 2025
The Shadow War: Predatory Sparrow vs. Iran’s Infrastructure
Ken Underhill
Oct 28, 2025
Critical Dell Storage Bugs Open Door to Remote Attacks
Ken Underhill
Oct 27, 2025
eSecurity Planet Logo

eSecurity Planet is a leading resource for IT professionals at large enterprises who are actively researching cybersecurity vendors and latest trends. eSecurity Planet focuses on providing instruction for how to approach common security challenges, as well as informational deep-dives about advanced cybersecurity topics.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.