In this simulated Lapsus$ attack, threat actors gained access to an enterprise cloud environment even with MFA and other prevention tools in place. See how the attack progressed — and what defenders can do to stop it.
A multi-factor authentication (MFA) bypass attack occurs when an attacker successfully circumvents an organization's MFA controls to gain unauthorized access. While authentication methods are an important part of prevention, they don’t always keep attackers from accessing accounts. Attackers can get around MFA requirements to gain VPN access, conduct network recon, swipe usernames and passwords and, ultimately, exfiltrate sensitive data.
Common types of MFA bypass techniques include:
Advanced MFA solutions, such as security keys and biometric verification, are a critical component of enterprise security. But don’t stop there. It’s equally crucial to monitor your environment for suspicious activity so you can catch an MFA bypass attack as soon as it happens.
Vectra AI uses more than 150 AI-driven detection models to reveal when an attacker gets around MFA and other preventative controls. With more than 90% MITRE ATT&CK coverage and 11 references in the MITRE D3FEND framework — more than any other vendor — Vectra AI detects common techniques cybercriminals use to circumvent MFA, including:
For example, in one simulated attack that began with purchased VPN access, the attacker:
But with Vectra AI, defenders know which entities are impacted, each surface occupied, and what response actions to take — and can quickly lock down the accounts in question.
What happens when a notorious cybercrime group bypasses MFA, steals credentials, and starts moving laterally? See below how the Lapsus$ ransomware group uses MFA bypass to breach into corporate networks and learn why AI-driven detections are essential to finding similar attacks.