Site icon RapidPhish

Why MFA Isn’t Stopping Modern Phishing Attacks

For years, security teams have promoted Multi-Factor Authentication (MFA) as the silver bullet for phishing. Add a second factor, stop account takeovers, problem solved. Except… it hasn’t worked that way.

While MFA is still a critical control, modern phishing campaigns are increasingly designed specifically to bypass it. In fact, many of today’s most damaging breaches involve organisations that had MFA fully enabled across Microsoft 365 or Google Workspace.

So what’s changed?

MFA Stops Password Theft — Not Session Theft

Traditional phishing aimed to steal usernames and passwords. MFA added a second hurdle: a one-time code, push notification, hardware key, or biometric approval. But attackers adapted. Instead of just stealing credentials, modern phishing attacks use Adversary-in-the-Middle (AiTM) techniques — often powered by reverse proxy frameworks — to intercept authentication in real time.

Here’s how it works:

  1. The victim clicks a phishing link.

  2. They’re presented with a page that looks identical to Microsoft 365 or Google.

  3. They enter their credentials.

  4. The phishing infrastructure forwards the request to the legitimate service.

  5. The victim completes MFA.

  6. The attacker captures the session token.

At this point, MFA has technically worked — but the attacker now has an authenticated session cookie that can be replayed without needing the password or second factor again. The result? Full account access.

The Rise of AiTM and Reverse Proxy Phishing

Reverse proxy kits have made MFA bypass accessible to moderately skilled attackers. These frameworks:

This technique has been used in high-profile breaches across retail, finance, and professional services sectors.

It’s no longer about “did the user enter a password?” — it’s about whether your controls can detect and block token replay attacks.

MFA Fatigue and Push Bombing

Even without advanced reverse proxy attacks, MFA has weaknesses.

Push-based MFA (like app approvals) has introduced a new social engineering vector: MFA fatigue attacks.

Attackers repeatedly trigger login attempts until a user, annoyed or confused, eventually taps “Approve.”

Sometimes they combine this with a phone call impersonating IT support:

“We’re fixing an issue with your account — please approve the request.”

The result is the same: the attacker gains authenticated access. MFA did its job technically. Human psychology did the rest.

OAuth Phishing and Consent Attacks

Another growing tactic is OAuth abuse. Instead of stealing credentials, attackers trick users into authorising a malicious app that requests access to:

Because the user is granting permission through legitimate identity workflows, MFA does nothing to stop it. This bypass doesn’t look like a failed login. It looks like authorised access.

Conditional Access Isn’t Bulletproof

Many organisations rely on conditional access policies to restrict logins based on:

But attackers can bypass these controls by:

If the authentication event appears legitimate, the session is often trusted.

So Is MFA Useless?

Absolutely not.

MFA dramatically reduces risk from basic phishing and credential stuffing. It remains a foundational security control.

But it is not sufficient on its own.

Modern phishing is designed to:

The conversation has shifted from “Do you have MFA enabled?” to:

“Have you tested whether your users can be phished in ways that bypass MFA?”

The Real Gap: Human Risk Under Modern Attack Scenarios

Many organisations still run basic phishing simulations:

This creates a false sense of security. If your phishing simulation cannot replicate modern attack techniques, you’re only testing against yesterday’s threats.

Security awareness training also needs to evolve. Users must understand:

Without this context, MFA becomes a comfort blanket rather than a control.

Testing What Actually Matters

To reduce risk in 2026 and beyond, organisations should:

  1. Simulate realistic phishing scenarios (including MFA interactions)

  2. Measure who enters credentials even when MFA is enabled

  3. Identify high-risk users who repeatedly fail advanced simulations

  4. Provide targeted remediation and training

  5. Monitor for abnormal session activity

The key is controlled, ethical testing — not exploitation.

Modern phishing simulation platforms are evolving to reflect this reality, moving beyond simple email templates toward more advanced attack modelling. This allows security teams to measure exposure to techniques that mirror real-world campaigns — including QR-based lures and MFA-aware credential capture flows. The goal isn’t to break security. It’s to understand where it breaks.

The Future of Phishing Defence

Attackers will continue to innovate. That’s guaranteed.

The question is whether organisations will:

MFA is necessary. But it’s not the finish line. The organisations that reduce breach risk most effectively are those that treat human risk as measurable, testable, and continuously improvable — not as a one-time compliance exercise.

Because in today’s threat landscape, the problem isn’t that MFA doesn’t work. It’s that attackers have learned how to work around it. If your security programme still assumes MFA equals protection, it may be time to ask a harder question:

Would your users recognise — and resist — a phishing attack designed to bypass it?

Exit mobile version