CASE FILE // PC-2026-04
Status: Open


Filing 02.08.00Field 27 APR 2026Classification PublicStatus Open

Adversary-in-the-middle phishing: the MFA-bypass that conventional MFA cannot stop

Average successful AitM incident: $1.85M. The 2023-2024 commoditisation of reverse-proxy phishing kits made AitM the default attack pattern against MFA-protected targets. Only FIDO2 / WebAuthn cryptographically breaks the relay chain.

Exhibit A

The attack pattern in detail


Adversary-in-the-middle (AitM) phishing inverts the traditional credential-harvest model. Instead of capturing the victim's username and password on a static fake page and replaying them later, the attacker hosts a live reverse-proxy server that sits between the victim and the real authentication endpoint. The victim visits the lure URL, enters credentials, completes the MFA challenge, and sees the real service load successfully because the attacker's proxy is forwarding every byte in real time to and from the actual destination. From the victim's perspective the login succeeds normally. From the attacker's perspective, the proxy has captured the session cookie that the real service issued on successful authentication.

The captured session cookie is the prize. The attacker can import it into a clean browser, paste it into a session storage, and immediately have authenticated access to the real service as the victim, without needing to re-authenticate. Most session cookies for major SaaS platforms have lifetimes measured in hours to weeks, giving the attacker a sustained window of authenticated access. The session cookie is independent of the victim's MFA token because the MFA challenge has already been completed; the cookie represents post-MFA authenticated state.[Microsoft Threat Intelligence AitM blog 2022-2024 + Mandiant M-Trends 2025]

Exhibit B

Why conventional MFA does not stop it


The central counter-intuitive point about AitM is that turning on MFA does not stop it. TOTP codes from Google Authenticator, SMS codes from carrier delivery, push notifications from Duo or Microsoft Authenticator (even with number-matching), and authenticator-app pseudo-OTPs all flow through the attacker's reverse proxy. The victim enters the code, the proxy forwards it to the real endpoint, the real endpoint validates the code and issues the session cookie, the proxy captures the cookie. The MFA challenge is satisfied because it was completed by a real victim in real time; the proxy is just a transparent forwarder of the legitimate flow.

The only MFA type that breaks AitM is phishing-resistant MFA based on FIDO2 / WebAuthn standards. FIDO2 works by cryptographically binding the authentication response to the origin URL that the browser is currently displaying. When the victim is on the attacker's lure domain, the FIDO2 authenticator sees the lure domain in the request and produces a signature scoped to the lure domain. The attacker's proxy cannot forward this signature to the real service because the real service expects a signature scoped to its own domain. The attacker can present the victim with a working-looking login flow but cannot extract a credential that works against the real destination.

The implication for defender architecture is uncomfortable: the broad MFA deployment that organisations completed through 2018-2022 does not, by itself, defend against the dominant phishing attack pattern of 2024-2026. The remediation requires an additional layer (FIDO2) on top of the existing MFA layer, with separate enrolment, separate user training, and separate device-management. Many enterprises are partway through this transition; many have not started.[FIDO Alliance technical specs + CISA Phishing-Resistant MFA guidance 2023]

Exhibit C

Evilginx and the phishing-as-a-service ecosystem

DECLASSIFIED

Evilginx is the open-source reverse-proxy phishing framework that did the most to commoditise AitM. Originally released as a red-team and security-research tool, Evilginx provides pre-built phishlets (phishing-flow templates) for Microsoft 365, Google Workspace, Okta, and many other common authentication targets. An operator with modest technical skill can deploy a working AitM phishing page for a major SaaS target in under an hour using the maintained Evilginx phishlet library.

Above Evilginx sit several phishing-as-a-service operators offering AitM kits on subscription pricing models. Pricing surveyed across the underground market for 2024-2025 runs $250 to $1,500 per month depending on the target catalogue, the level of operator support, and the obfuscation features included. The premium tiers include features like rotating-domain registration, automated DGA-based lure-link generation, anti-bot screening on the lure page, and integration with credential-monetisation pipelines. The economics of running a small AitM operation are favourable to attackers at these subscription prices because a single successful enterprise compromise yields losses materially above the annual subscription cost.

The Microsoft Threat Intelligence team has tracked multiple distinct AitM clusters through 2023-2024, including the Storm-1167 and Caffeine clusters, with attribution to a mix of financially-motivated criminal groups and some state-actor activity. The defender expectation is that the AitM attack class will remain the dominant phishing pattern through at least 2027 because the attacker-side toolchain is mature, the defender-side response (FIDO2 deployment) is slow, and the economics work for the attacker.[Microsoft Storm-1167 and Caffeine cluster reporting 2023-2024 + Mandiant M-Trends 2025]

Exhibit D

Cost-line build-up against the $1.85M figure


Cost lineShare of $1.85MDollar figureDriver
Mailbox-takeover containment + downstream BEC33%$611KAitM frequently pivots to BEC; see /by-attack/bec
Data exfiltration scoping + IR21%$389KSaaS-data exfil during session window
Credential-reset + FIDO2 emergency rollout14%$259KPost-event identity-architecture rework
Forensic investigation11%$204KSession-cookie attribution work
Notification + monitoring10%$185KWhere exfil triggered notification
Legal + class-action exposure7%$130KLower than direct-wire variants
Customer-trust restoration4%$74KIf customer-facing systems were touched

The mailbox-takeover line dominates because AitM against a Microsoft 365 or Google Workspace target yields a usable email session, which is the highest-value access type for attacker pivots. The downstream BEC cost is partially captured here and partially appears in the BEC event totals; allocation between the two depends on incident-accounting choices.[IBM 2025 + Mandiant M-Trends 2025 AitM cohort]

Exhibit E

The control stack: FIDO2 first, token-binding second, behavioural third


#1FIDO2 / WebAuthn hardware-key MFA universally

~98% of AitM success
Cost: ~$50 per user one-time

The only control that cryptographically breaks the AitM relay. Origin-bound signatures cannot be forwarded by the proxy. Universal deployment is the strategic target; per-role deployment for high-risk identities is the pragmatic interim.

#2Token-protection conditional access (Microsoft) / DBSC (Google)

~85% of session-replay value
Cost: Platform-licence dependent

Binds the session cookie to the device that issued it through a cryptographic device certificate. A stolen cookie cannot be replayed from the attacker's browser. Catches the residual cases where FIDO2 has not yet been deployed.

#3Behavioural email security with AitM-detection

~60% of lure delivery
Cost: $42 to $96 per mailbox per year

Behavioural email security (Abnormal, Tessian-class) catches the lure-delivery step. Detects the typical AitM-lure patterns: novel domain, recent registration, no organisational history. Catches the lure before the victim visits.

#4Anomalous-session-cookie monitoring

~40% of post-compromise dwell
Cost: SIEM-licence + 1 FTE detection-engineering

Identity-platform logs flag anomalous session reuse (cookie used from a new geography, new device, or in rapid sequence with the legitimate session). Catches the AitM compromise after the fact but compresses the dwell window.

#5User-awareness on lure-URL inspection

~15% of click rate
Cost: $2 to $5 per user per year incremental

Train users to inspect the URL bar before entering credentials. Modest impact because AitM lures use lookalike domains that are difficult to inspect on mobile. Useful as a layer, not as a primary defence.

#6Reduced session-cookie lifetime

~30% of post-compromise blast
Cost: UX-cost from re-authentication friction

Shortening session-cookie lifetimes (from days to hours) reduces the window in which a stolen cookie is useful. UX cost is real but the security trade is favourable for high-risk identities.

Exhibit F

The Okta and Microsoft 365 AitM patterns


Two AitM patterns dominate the 2024-2026 enterprise loss picture. The first is AitM against Microsoft 365 directly. The lure points at a credible-looking Microsoft 365 login URL, the victim enters credentials and completes their normal MFA, the attacker captures the session cookie, the attacker is inside the victim's mailbox within seconds. From the mailbox the attacker typically pivots to BEC (see /by-attack/bec), to OneDrive data exfil, or to teams/channels content that yields M&A or competitive-intelligence value. Microsoft 365 mailbox-takeover is now the dominant initial-pivot path for AitM-rooted BEC events in the IC3 docket.

The second is AitM against the identity provider itself (Okta, Microsoft Entra, Google Workspace SSO). The pattern is similar but the attacker prize is broader: the session cookie for the identity provider unlocks SSO across every downstream SaaS that uses the IdP for authentication. A single successful Okta-AitM compromise can yield session access to a hundred or more downstream SaaS applications without further authentication. The Cloudflare 2022 AitM attempt, while ultimately unsuccessful (FIDO2 saved the company), illustrates the IdP-AitM pattern and its potential blast radius. Cloudflare disclosed the incident publicly and the post-mortem is widely cited as one of the canonical FIDO2 success stories.[Microsoft Threat Intelligence + Cloudflare August 2022 incident report]

Exhibit G

Frequently filed questions

ON RECORD

What is AitM phishing?[open]

Adversary-in-the-middle phishing uses a reverse-proxy server between the victim and the real authentication endpoint, capturing the session cookie that is issued after successful MFA completion.

Does turning on MFA stop AitM?[open]

No. TOTP, SMS, push (with or without number-matching), and authenticator-app codes all flow through the proxy. Only FIDO2 / WebAuthn cryptographically breaks the relay.

What does an AitM attack cost?[open]

$1.85M average per successful incident. Dominated by mailbox-takeover containment and the downstream BEC pivot value.

What is Evilginx?[open]

An open-source reverse-proxy phishing framework with pre-built phishlets for major SaaS authentication targets. Originally a red-team tool, now widely adopted in criminal phishing operations.

What is the share of phishing volume now AitM?[open]

Approximately 25% as of mid-2024 (Microsoft Threat Intelligence), up from low single digits in 2022. The growth tracks the commoditisation of phishing-as-a-service AitM kits.

What is token-protection / DBSC?[open]

Token-protection conditional access (Microsoft Entra) and Device-Bound Session Credentials (Google Workspace) bind session cookies cryptographically to the issuing device. Stolen cookies cannot be replayed elsewhere. Available in 2026, under-deployed.

Should we deploy FIDO2 universally?[open]

Yes, strategically. Per-role deployment for high-risk identities (admin, finance, platform engineers) is the pragmatic interim. The economics favour universal deployment over 18-24 months for any organisation with material AitM exposure.

Updated 2026-04-27