For years, security teams have promoted Multi-Factor Authentication (MFA) as the silver bullet for phishing. Add a second factor, stop account takeovers, problem solved. Except… it hasn’t worked that way.
While MFA is still a critical control, modern phishing campaigns are increasingly designed specifically to bypass it. In fact, many of today’s most damaging breaches involve organisations that had MFA fully enabled across Microsoft 365 or Google Workspace.
So what’s changed?
MFA Stops Password Theft — Not Session Theft
Traditional phishing aimed to steal usernames and passwords. MFA added a second hurdle: a one-time code, push notification, hardware key, or biometric approval. But attackers adapted. Instead of just stealing credentials, modern phishing attacks use Adversary-in-the-Middle (AiTM) techniques — often powered by reverse proxy frameworks — to intercept authentication in real time.
Here’s how it works:
-
The victim clicks a phishing link.
-
They’re presented with a page that looks identical to Microsoft 365 or Google.
-
They enter their credentials.
-
The phishing infrastructure forwards the request to the legitimate service.
-
The victim completes MFA.
-
The attacker captures the session token.
At this point, MFA has technically worked — but the attacker now has an authenticated session cookie that can be replayed without needing the password or second factor again. The result? Full account access.
The Rise of AiTM and Reverse Proxy Phishing
Reverse proxy kits have made MFA bypass accessible to moderately skilled attackers. These frameworks:
-
Clone real login pages dynamically
-
Forward traffic to legitimate services
-
Capture authentication tokens
-
Maintain persistent access
This technique has been used in high-profile breaches across retail, finance, and professional services sectors.
It’s no longer about “did the user enter a password?” — it’s about whether your controls can detect and block token replay attacks.
MFA Fatigue and Push Bombing
Even without advanced reverse proxy attacks, MFA has weaknesses.
Push-based MFA (like app approvals) has introduced a new social engineering vector: MFA fatigue attacks.
Attackers repeatedly trigger login attempts until a user, annoyed or confused, eventually taps “Approve.”
Sometimes they combine this with a phone call impersonating IT support:
“We’re fixing an issue with your account — please approve the request.”
The result is the same: the attacker gains authenticated access. MFA did its job technically. Human psychology did the rest.
OAuth Phishing and Consent Attacks
Another growing tactic is OAuth abuse. Instead of stealing credentials, attackers trick users into authorising a malicious app that requests access to:
-
Mailboxes
-
Contacts
-
Files
-
SharePoint or Drive data
Because the user is granting permission through legitimate identity workflows, MFA does nothing to stop it. This bypass doesn’t look like a failed login. It looks like authorised access.
Conditional Access Isn’t Bulletproof
Many organisations rely on conditional access policies to restrict logins based on:
-
Geography
-
Device compliance
-
Risk signals
But attackers can bypass these controls by:
-
Using residential proxy IPs
-
Hijacking active sessions
-
Targeting unmanaged devices
-
Leveraging token replay
If the authentication event appears legitimate, the session is often trusted.
So Is MFA Useless?
Absolutely not.
MFA dramatically reduces risk from basic phishing and credential stuffing. It remains a foundational security control.
But it is not sufficient on its own.
Modern phishing is designed to:
-
Capture tokens, not just passwords
-
Exploit user behaviour
-
Abuse trust mechanisms
-
Operate within legitimate authentication flows
The conversation has shifted from “Do you have MFA enabled?” to:
“Have you tested whether your users can be phished in ways that bypass MFA?”
The Real Gap: Human Risk Under Modern Attack Scenarios
Many organisations still run basic phishing simulations:
-
Generic credential harvest pages
-
Simple email templates
-
No MFA interaction
-
No session testing
This creates a false sense of security. If your phishing simulation cannot replicate modern attack techniques, you’re only testing against yesterday’s threats.
Security awareness training also needs to evolve. Users must understand:
-
Why QR code logins can be dangerous
-
What session hijacking means
-
Why approving unexpected MFA prompts is risky
-
How OAuth consent abuse works
Without this context, MFA becomes a comfort blanket rather than a control.
Testing What Actually Matters
To reduce risk in 2026 and beyond, organisations should:
-
Simulate realistic phishing scenarios (including MFA interactions)
-
Measure who enters credentials even when MFA is enabled
-
Identify high-risk users who repeatedly fail advanced simulations
-
Provide targeted remediation and training
-
Monitor for abnormal session activity
The key is controlled, ethical testing — not exploitation.
Modern phishing simulation platforms are evolving to reflect this reality, moving beyond simple email templates toward more advanced attack modelling. This allows security teams to measure exposure to techniques that mirror real-world campaigns — including QR-based lures and MFA-aware credential capture flows. The goal isn’t to break security. It’s to understand where it breaks.
The Future of Phishing Defence
Attackers will continue to innovate. That’s guaranteed.
The question is whether organisations will:
-
Continue relying solely on perimeter controls
-
Or actively test how users behave under modern attack conditions
MFA is necessary. But it’s not the finish line. The organisations that reduce breach risk most effectively are those that treat human risk as measurable, testable, and continuously improvable — not as a one-time compliance exercise.
Because in today’s threat landscape, the problem isn’t that MFA doesn’t work. It’s that attackers have learned how to work around it. If your security programme still assumes MFA equals protection, it may be time to ask a harder question:
Would your users recognise — and resist — a phishing attack designed to bypass it?

