This post has been de-listed
It is no longer included in search results and normal feeds (front page, hot posts, subreddit posts, etc). It remains visible only via the author's post history.
Hey Redditors,
I need your advice.
Currently, I'm try to investigate the AiTM attack method in the Microsoft Cloud environment.
Some of my references I get my knowledge from are:
I recall my previous employer experiencing such an attack. A user received an email with a QR code, scanned it, and subsequently entered their username and password.
According to the user, the subsequent MFA prompt was NOT confirmed. I also remember seeing in the login-logs that MFA was not confirmed.
Despite this, the attacker was able to add a second factor, authenticate, and initiate a BEC.
My question is:
How could the attacker register a second factor and complete the login without full authentication process from the user?
From what I've read online so far, for me itβs not entirely clear how this is possible. Some ressources state that MFA confirmation is required, while others suggest it can be bypassed.
Can someone please explain this to me?
Thanks in advance!
Subreddit
Post Details
- Posted
- 5 months ago
- Reddit URL
- View post on reddit.com
- External URL
- reddit.com/r/cybersecuri...