{"id":49381,"date":"2022-11-18T10:59:24","date_gmt":"2022-11-18T10:59:24","guid":{"rendered":"http:\/\/1f415ed3-784c-4288-a3ec-22768fe2ccb9"},"modified":"2022-11-18T10:59:24","modified_gmt":"2022-11-18T10:59:24","slug":"microsoft-hackers-are-using-this-concerning-tactic-to-dodge-multi-factor-authentication","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/microsoft-hackers-are-using-this-concerning-tactic-to-dodge-multi-factor-authentication\/","title":{"rendered":"Microsoft: Hackers are using this &#8216;concerning&#8217; tactic to dodge multi-factor authentication"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage c-cmsImage_loaded\"><source media=\"(max-width: 767px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/bd0c35f235969e8f78ea7d673e80e42bf4058e0a\/2022\/02\/11\/e9c65bd2-d11d-4c7d-bb5e-ac730316b1c8\/gettyimages-1301674928.jpg?auto=webp&amp;width=768\" alt=\"Hands typing at a computer with other electronics on the table\"><source media=\"(max-width: 1023px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/ec05b9b68ca7d96c3e48a8ecb3017202ef569d39\/2022\/02\/11\/e9c65bd2-d11d-4c7d-bb5e-ac730316b1c8\/gettyimages-1301674928.jpg?auto=webp&amp;width=1024\" alt=\"Hands typing at a computer with other electronics on the table\"><source media=\"(max-width: 1440px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/875cb933e03370cd88897cfde1440522a6bc91c0\/2022\/02\/11\/e9c65bd2-d11d-4c7d-bb5e-ac730316b1c8\/gettyimages-1301674928.jpg?auto=webp&amp;width=1200\" alt=\"Hands typing at a computer with other electronics on the table\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/875cb933e03370cd88897cfde1440522a6bc91c0\/2022\/02\/11\/e9c65bd2-d11d-4c7d-bb5e-ac730316b1c8\/gettyimages-1301674928.jpg?auto=webp&amp;width=1200\" alt=\"Hands typing at a computer with other electronics on the table\" width=\"1200\" height=\"800.4024144869215\" fetchpriority=\"low\"><\/picture><\/div>\n<p> <!----><\/div>\n<p> <!----> <!----><\/figure>\n<p>Microsoft has outlined several mitigations to protect against attacks on multi-factor authentication that will unfortunately make life more difficult for your remote workers.&nbsp;<\/p>\n<p>Three years ago, attacks on multi-factor authentication (MFA) were so rare that Microsoft <a href=\"https:\/\/www.zdnet.com\/article\/microsoft-mfa-bypass-attacks-are-so-rare-we-dont-have-good-statistics-on-them\/\" rel=\"follow\">didn&#8217;t have decent statistics on them<\/a>, largely because few organisations had enabled MFA. &nbsp;&nbsp;<\/p>\n<p>But with MFA use rising as attacks on passwords become more common, Microsoft has seen an increase in attackers using token theft in their attempts to sidestep MFA.&nbsp;<\/p>\n<p>In these attacks, the attacker compromises a token issued to someone who&#8217;s already completed MFA and replays that token to gain access from a different device. Tokens are central to OAuth 2.0 identity platforms, including Azure Active Directory (AD), which aim to make authentication simpler and faster for users, but in a way that&#8217;s still resilient to password attacks.&nbsp;<\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/article\/cybersecurity-jobs-five-ways-to-help-you-build-your-career\/\" rel=\"follow\">Cybersecurity jobs: Five ways to help you build your career<\/a><\/strong><\/p>\n<p>Moreover, Microsoft warns that token theft is dangerous because it doesn&#8217;t require high technical skills, detection is difficult and, because the technique has only recently seen an uptick, few organisations have mitigations in place.&nbsp;<\/p>\n<p>&#8220;Recently, the Microsoft Detection and Response Team (DART) has seen an increase in attackers utilizing token theft for this purpose,&#8221; <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/11\/16\/token-tactics-how-to-prevent-detect-and-respond-to-cloud-token-theft\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Microsoft says in a blogpost<\/a>.&nbsp;<\/p>\n<p>&#8220;By compromising and replaying a token issued to an identity that has already completed multifactor authentication, the threat actor satisfies the validation of MFA and access is granted to organizational resources accordingly. This poses to be a concerning tactic for defenders because the expertise needed to compromise a token is very low, is hard to detect, and few organizations have token theft mitigations in their incident response plan.&#8221;<\/p>\n<p>When accessing web applications shielded by Azure AD, the user needs to present a valid token, which they can get after signing into Azure AD using their credentials. Admins can set policy to require MFA to sign into an account from a browser. The token issued to the user is presented to the web application, which validates the token and opens up access.&nbsp;<\/p>\n<p>&#8220;When the user is phished, the malicious infrastructure captures both the credentials of the user, and the token,&#8221; Microsoft explains.&nbsp;<\/p>\n<p>If both credentials and the token are stolen, the attacker can use these for numerous attacks. Microsoft highlights business email compromise, which is the largest cause of cybercrime financial losses today.<\/p>\n<p><strong>Also: <\/strong><a href=\"https:\/\/www.zdnet.com\/article\/technology-spending-will-rise-next-year-and-this-old-favourite-is-still-a-top-priority\/\" rel=\"follow\"><strong>Technology spending will rise next year. And this old favourite is still a top priority<\/strong><\/a><\/p>\n<p>Microsoft also warns of &#8220;Pass-the-cookie&#8221; attacks, where an attacker compromises a device and extracts browser cookies that are created after authentication to Azure AD from a browser. The attacker passes the cookie to another browser on another system to bypass security checks.<\/p>\n<p>&#8220;Users who are accessing corporate resources on personal devices are especially at risk. Personal devices often have weaker security controls than corporate-managed devices and IT staff lack visibility to those devices to determine compromise,&#8221; Microsoft notes. This is a greater risk for remote workers who use personal devices.&nbsp;<\/p>\n<p>To counter the threat of token theft attacks on MFA, Microsoft recommends shortening session and token lifetimes, though this has a convenience cost to the user. Mitigations include: &nbsp;<\/p>\n<ul>\n<li>Reducing the lifetime of the session increases the number of times a user is forced to re-authenticate&nbsp;<\/li>\n<li>Reducing the viable time of a token forces threat actors to increase the frequency of token theft attempts&nbsp;<\/li>\n<li>Microsoft recommends implemeting Conditional Access App Control in Microsoft Defender for Cloud Apps for users connecting from unmanaged devices<\/li>\n<\/ul>\n<p>Microsoft also recommends implementing FIDO2 security keys, Windows Hello for Business, or certificate-based authentication for users.<\/p>\n<p>Users with high-level privileges, such as the Global Domain admin, should have a segregated cloud-only identity. This will help reduce the attack surface from on-premises to cloud if an attacker compromises on-premises systems. These identities should not have a mailbox attached to them, Microsoft said.<\/p>\n<p>&#8220;We recognize that while it may be recommended for organizations to enforce location, device compliance, and session lifetime controls to all applications it may not always be practical,&#8221; Microsoft notes.&nbsp;<\/p>\n<div id=\"pinbox-1f415ed3-784c-4288-a3ec-22768fe2ccb9\" class=\"c-shortcodePinbox-carousel\">\n<div class=\"c-listingCarouselHorizontal\">\n<h4 class=\"c-sectionHeading\">More Microsoft<\/h4>\n<p> <!----> <\/div>\n<\/div>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/microsoft-hackers-are-using-this-concerning-tactic-to-dodge-multi-factor-authentication\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft says token theft attacks are on the rise. Here&#8217;s what you need to do to protect yourself.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-49381","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft: Hackers are using this &#039;concerning&#039; tactic to dodge multi-factor authentication 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/microsoft-hackers-are-using-this-concerning-tactic-to-dodge-multi-factor-authentication\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft: Hackers are using this &#039;concerning&#039; tactic to dodge multi-factor authentication 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/microsoft-hackers-are-using-this-concerning-tactic-to-dodge-multi-factor-authentication\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-18T10:59:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/875cb933e03370cd88897cfde1440522a6bc91c0\/2022\/02\/11\/e9c65bd2-d11d-4c7d-bb5e-ac730316b1c8\/gettyimages-1301674928.jpg?auto=webp&amp;width=1200\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-hackers-are-using-this-concerning-tactic-to-dodge-multi-factor-authentication\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-hackers-are-using-this-concerning-tactic-to-dodge-multi-factor-authentication\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Microsoft: Hackers are using this &#8216;concerning&#8217; tactic to dodge multi-factor authentication\",\"datePublished\":\"2022-11-18T10:59:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-hackers-are-using-this-concerning-tactic-to-dodge-multi-factor-authentication\\\/\"},\"wordCount\":700,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-hackers-are-using-this-concerning-tactic-to-dodge-multi-factor-authentication\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/875cb933e03370cd88897cfde1440522a6bc91c0\\\/2022\\\/02\\\/11\\\/e9c65bd2-d11d-4c7d-bb5e-ac730316b1c8\\\/gettyimages-1301674928.jpg?auto=webp&amp;width=1200\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-hackers-are-using-this-concerning-tactic-to-dodge-multi-factor-authentication\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-hackers-are-using-this-concerning-tactic-to-dodge-multi-factor-authentication\\\/\",\"name\":\"Microsoft: Hackers are using this 'concerning' tactic to dodge multi-factor authentication 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-hackers-are-using-this-concerning-tactic-to-dodge-multi-factor-authentication\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-hackers-are-using-this-concerning-tactic-to-dodge-multi-factor-authentication\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/875cb933e03370cd88897cfde1440522a6bc91c0\\\/2022\\\/02\\\/11\\\/e9c65bd2-d11d-4c7d-bb5e-ac730316b1c8\\\/gettyimages-1301674928.jpg?auto=webp&amp;width=1200\",\"datePublished\":\"2022-11-18T10:59:24+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-hackers-are-using-this-concerning-tactic-to-dodge-multi-factor-authentication\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-hackers-are-using-this-concerning-tactic-to-dodge-multi-factor-authentication\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-hackers-are-using-this-concerning-tactic-to-dodge-multi-factor-authentication\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/875cb933e03370cd88897cfde1440522a6bc91c0\\\/2022\\\/02\\\/11\\\/e9c65bd2-d11d-4c7d-bb5e-ac730316b1c8\\\/gettyimages-1301674928.jpg?auto=webp&amp;width=1200\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/875cb933e03370cd88897cfde1440522a6bc91c0\\\/2022\\\/02\\\/11\\\/e9c65bd2-d11d-4c7d-bb5e-ac730316b1c8\\\/gettyimages-1301674928.jpg?auto=webp&amp;width=1200\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-hackers-are-using-this-concerning-tactic-to-dodge-multi-factor-authentication\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft: Hackers are using this &#8216;concerning&#8217; tactic to dodge multi-factor authentication\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft: Hackers are using this 'concerning' tactic to dodge multi-factor authentication 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/microsoft-hackers-are-using-this-concerning-tactic-to-dodge-multi-factor-authentication\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft: Hackers are using this 'concerning' tactic to dodge multi-factor authentication 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/microsoft-hackers-are-using-this-concerning-tactic-to-dodge-multi-factor-authentication\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-11-18T10:59:24+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/875cb933e03370cd88897cfde1440522a6bc91c0\/2022\/02\/11\/e9c65bd2-d11d-4c7d-bb5e-ac730316b1c8\/gettyimages-1301674928.jpg?auto=webp&amp;width=1200","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-hackers-are-using-this-concerning-tactic-to-dodge-multi-factor-authentication\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-hackers-are-using-this-concerning-tactic-to-dodge-multi-factor-authentication\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Microsoft: Hackers are using this &#8216;concerning&#8217; tactic to dodge multi-factor authentication","datePublished":"2022-11-18T10:59:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-hackers-are-using-this-concerning-tactic-to-dodge-multi-factor-authentication\/"},"wordCount":700,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-hackers-are-using-this-concerning-tactic-to-dodge-multi-factor-authentication\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/875cb933e03370cd88897cfde1440522a6bc91c0\/2022\/02\/11\/e9c65bd2-d11d-4c7d-bb5e-ac730316b1c8\/gettyimages-1301674928.jpg?auto=webp&amp;width=1200","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-hackers-are-using-this-concerning-tactic-to-dodge-multi-factor-authentication\/","url":"https:\/\/www.threatshub.org\/blog\/microsoft-hackers-are-using-this-concerning-tactic-to-dodge-multi-factor-authentication\/","name":"Microsoft: Hackers are using this 'concerning' tactic to dodge multi-factor authentication 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-hackers-are-using-this-concerning-tactic-to-dodge-multi-factor-authentication\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-hackers-are-using-this-concerning-tactic-to-dodge-multi-factor-authentication\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/875cb933e03370cd88897cfde1440522a6bc91c0\/2022\/02\/11\/e9c65bd2-d11d-4c7d-bb5e-ac730316b1c8\/gettyimages-1301674928.jpg?auto=webp&amp;width=1200","datePublished":"2022-11-18T10:59:24+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-hackers-are-using-this-concerning-tactic-to-dodge-multi-factor-authentication\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/microsoft-hackers-are-using-this-concerning-tactic-to-dodge-multi-factor-authentication\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-hackers-are-using-this-concerning-tactic-to-dodge-multi-factor-authentication\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/875cb933e03370cd88897cfde1440522a6bc91c0\/2022\/02\/11\/e9c65bd2-d11d-4c7d-bb5e-ac730316b1c8\/gettyimages-1301674928.jpg?auto=webp&amp;width=1200","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/875cb933e03370cd88897cfde1440522a6bc91c0\/2022\/02\/11\/e9c65bd2-d11d-4c7d-bb5e-ac730316b1c8\/gettyimages-1301674928.jpg?auto=webp&amp;width=1200"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-hackers-are-using-this-concerning-tactic-to-dodge-multi-factor-authentication\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Microsoft: Hackers are using this &#8216;concerning&#8217; tactic to dodge multi-factor authentication"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/49381","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=49381"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/49381\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=49381"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=49381"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=49381"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}