DiscoverThe Defender's Advantage PodcastHow Threat Actors Bypass Multi-Factor Authentication
How Threat Actors Bypass Multi-Factor Authentication

How Threat Actors Bypass Multi-Factor Authentication

Update: 2024-09-26
Share

Description

Josh Fleischer, Principal Security Analyst with Mandiant's Managed Defense organization sits down with host Luke McNamara to discuss trends in MFA bypass and how threat actors are conducting adversary in the middle (AiTM) attacks to gain access to targeted organizations. Josh walks through a case study of MFA bypass, how token theft occurs, the increasing amount of AiTM activity with more features being added to phishing kits, and more. 

Comments 
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

How Threat Actors Bypass Multi-Factor Authentication

How Threat Actors Bypass Multi-Factor Authentication

Mandiant