Threat actors are stealing authentication tokens already verified by multifactor authentication (MFA) to breach organizations’ systems.
A new alert from Microsoft Detection and Response Team (DART), said token theft for MFA bypass is particularly dangerous because it requires little technical expertise to pull off, it’s tough to detect, and most organizations haven’t considered token theft as part of their incident response plan. And as employees increasingly access systems through personal devices, security controls are weaker and malicious activity is hidden from the security team’s view.
Full visibility into devices reduces token theft risk, but DART concedes that’s difficult with so many unmanaged devices accessing the network. For unmanaged devices, they recommend conditional access policies and strong controls.
“As far as mitigations go, publicly available open-source tools for exploiting token theft already exist, and commodity credential theft malware has already been adapted to include this technique in their arsenal,” DART added in its blog post about the MFA workaround. “Detecting token theft can be difficult without the proper safeguards and visibility into authentication endpoints.”