8 min read
Why Your MFA Can Still Be Hacked (How I’d Implement MFA in 2026)
In today’s attack landscape, not all MFA methods should be treated equal. Across Microsoft 365 tenants, one of the fastest-growing attack...
3 min read
Nick Ross
:
Dec 22, 2025 9:49:52 AM
In today’s attack landscape, not all MFA methods should be treated equal.
Across Microsoft 365 tenants, one of the fastest-growing attack techniques I’m seeing today is Adversary-in-the-Middle (AiTM) phishing — often paired with token theft.
In this post, I’ll walk through:
I’ll also share practical Conditional Access strategies you can apply today for real defense-in-depth.
Meet Orion Financial, a mid-size accounting firm that lives entirely in Microsoft 365.
They had MFA enabled across every account:
SMS codes
Authenticator prompts
All the “right” boxes checked
One morning, their finance manager receives an email that looks completely legitimate — a OneDrive document share notification. He clicks the link, opens what appears to be a Microsoft sign-in page, and logs in.
✅ Password
✅ MFA approval
He’s then redirected to the Microsoft 365 portal. Nothing seems wrong.
But here’s the catch:
He didn’t sign into Microsoft. He signed into an attacker’s proxy site.

That fake login page was part of an AiTM phishing infrastructure.
While the user believed he was signing into Microsoft:
The attacker captured his username and password
Intercepted his session tokens
At that point, the attacker opened an incognito browser, injected the stolen session cookie, and was instantly authenticated as the user. No password, no MFA prompt, no friction.
From Microsoft’s perspective, this looked like a successful MFA sign-in.
So the question isn’t “Do you have MFA?”
It’s “What kind of MFA are you enforcing?”
Let’s break down how I’d approach MFA going into 2026.
This sounds obvious but it’s still widely missed. I also still see a ton of tenants still leveraging per user MFA settings vs a modern deployment with Conditional Access. Per user settings leave you much more exposed to potential holes as new accounts are created in the organization.
MFA must apply to:
All user accounts
Privileged accounts
Service accounts with interactive logins
If an account can authenticate, it can be hijacked.
Wherever possible:
Replace service accounts with managed identities or service principals
Eliminate shared or “temporary” accounts that never expire
If a login exists, MFA belongs there.
SMS, voice calls, and email OTPs should be considered legacy authentication methods.
They’re vulnerable to:
SIM swapping
Social Engineering
Compromise (think of a user leveraging their personal Gmail as their second factor).
At an absolute minimum, organizations should be using Microsoft Authenticator with number matching. This forces users to confirm a number shown on-screen, dramatically reducing MFA fatigue attacks.
Before disabling old methods, review user registration data carefully, ripping them out without a plan will cause outages and support tickets.
This is where MFA finally catches up to modern threats.
Phishing-resistant MFA includes:
Windows Hello for Business
FIDO2 security keys
Passkeys (including iPhone and Android support)
These methods use device-bound cryptographic keys instead of shared secrets.
Even if a user lands on a perfect fake login page:
The authentication cannot complete
The key won’t sign a request for the wrong origin
Token replay fails
This single change breaks AiTM attacks entirely.
Start with:
Global admins
Executives
Finance and high-impact roles
Then expand outward in phases.
Many breaches don’t start with internal users; they start with partners and suppliers.
Guest users often have access to:
Teams
SharePoint
Sensitive documents
If their account is compromised, your tenant becomes the blast radius.
Best practices:
Enforce MFA for guest users
Review external access regularly
Treat long-term partners differently than one-off guests
A single compromised guest account is enough to trigger an AiTM chain reaction.
Microsoft has introduced token protection controls in Conditional Access (included in P1) designed to stop replay attacks and they’re promising.
However, today they are:
Limited in scope
Windows-only
Restricted to mobile and desktop clients
Not effective against browser-based AiTM attacks
Token protection is worth piloting, but it is not a silver bullet yet. Check out more in my post here: Breaking Down Token Protection In Conditional Access
If your MFA strategy hasn’t changed in the last few years, it’s already behind.
Attackers have evolved.
Your identity security needs to evolve with them.
8 min read
In today’s attack landscape, not all MFA methods should be treated equal. Across Microsoft 365 tenants, one of the fastest-growing attack...
9 min read
Most MSPs still run with standing access to customer tenants through GDAP. That’s convenient but dangerous. Switching to Privileged Identity...
17 min read
If you bought Microsoft 365 through GoDaddy, you probably love how easy it was to get started, domain, email, and Office apps up and running...