The Illusion of the Silver Bullet
In the modern cybersecurity landscape, Multi-Factor Authentication (MFA) is often treated as the ultimate defensive wall. Organizations roll out Identity Providers (IdP) like Microsoft Entra ID or Okta, enable 2FA, and breathe a sigh of relief, assuming that stolen passwords are now useless.
However, that sense of security is often dangerously misplaced. While MFA is a critical control, it is not a panacea. In complex Windows environments, attackers continue to compromise networks every day using valid credentials—not because they cracked the MFA code, but because they found the gaps where MFA simply doesn't look.
The Threat: Where Coverage Ends and Abuse Begins
The core issue isn't the technology of MFA itself, but rather the scope of its coverage. When we talk about "MFA gaps," we are referring to scenarios where authentication occurs, or tokens are used, outside the enforced view of the IdP.
In many hybrid Windows environments, identity is a patchwork of cloud-first policies and legacy on-premises protocols. Attackers leverage these inconsistencies. If an attacker can obtain a Primary Refresh Token (PRT), a session cookie, or hijack a signed-in user session, they often do not need to satisfy an MFA challenge. They are effectively "already past the door." Furthermore, legacy authentication protocols—such as LDAP, NTLM, or older versions of Active Directory Federation Services (ADFS)—often lack the nuance to support modern Conditional Access policies, creating a highway for credential abuse.
Technical Analysis: Attack Vectors and TTPs
To defend against this, we must understand the Tactics, Techniques, and Procedures (TTPs) attackers use to exploit MFA boundaries.
1. Token Theft and Pass-the-Cache Rather than phishing for credentials and attempting to pass an MFA prompt in real-time (which risks detection), sophisticated adversaries focus on stealing tokens. Tools like Mimikatz can be used to extract Kerberos tickets or NTLM hashes from memory. If an attacker has a valid Kerberos Ticket Granting Ticket (TGT), they can access network resources without re-authenticating, effectively rendering MFA irrelevant for that session.
2. Legacy Protocol Abuse Many organizations enforce MFA via Entra ID Conditional Access for web traffic. However, if legacy clients are still connecting via IMAP, POP3, or basic authentication over LDAP, these protocols may bypass the modern policy enforcement points. An attacker with valid credentials for a legacy service can authenticate without ever triggering an MFA push.
3. Hybrid Identity Gaps In environments using Pass-Through Authentication (PTA) or Federated authentication (ADFS), the enforcement point shifts. If the on-premises infrastructure is compromised, or if the trust between the on-prem AD and the cloud IdP is manipulated, an attacker can forge tokens or modify claims to bypass cloud-enforced MFA requirements.
Detection and Threat Hunting
Identifying credential abuse in the presence of MFA requires hunting for anomalies in usage patterns rather than just looking for failed authentication attempts. You need to find instances where valid credentials are used in ways that MFA should have prevented but didn't.
Hunting for Sign-ins Bypassing MFA
Use the following KQL query in Microsoft Sentinel to hunt for successful sign-ins to sensitive apps where MFA was not processed, which could indicate a legacy protocol or a compromised session token.
SigninLogs
| where Result == "success"
| where ConditionalAccessStatus == "notApplied"
| where AuthenticationRequirement != "multiFactorAuthentication"
| project Timestamp, UserPrincipalName, AppDisplayName, DeviceDetail, Location, ConditionalAccessStatus, AuthenticationRequirement
| order by Timestamp desc
Auditing Legacy Authentication Protocols
Legacy protocols often leave distinct traces. This PowerShell snippet helps identify if basic auth is still enabled or if there are suspicious legacy binding attempts on your Entra ID tenant via the Graph API (requires Connect-MgGraph).
# Connect to Microsoft Graph
Connect-MgGraph -Scopes "AuditLog.Read.All", "Directory.Read.All"
# Filter for sign-in logs where legacy auth was used (ClientApp == 'Other' or specific legacy protocols)
Get-MgAuditLogSignIn -Filter "result eq 'success' and clientAppUsed eq 'Other'" -Top 100 |
Select-Object CreatedDateTime, UserPrincipalName, AppId, ClientAppUsed, DeviceDetail, Location |
Format-Table -AutoSize
Mitigation Strategies
Closing the gap between MFA enforcement and credential abuse requires a defense-in-depth approach that goes beyond simply checking the "Enable MFA" box.
-
Disable Legacy Authentication: Aggressively block legacy authentication protocols (IMAP, POP3, SMTP Auth) and enforce Modern Authentication (OAuth2) for all connections. Entra ID allows you to block legacy protocols outright via Conditional Access policies.
-
Implement Continuous Access Evaluation (CAE): Move beyond sign-in time security. CAE allows Microsoft Entra ID to evaluate session validity in real-time, revoking access immediately if critical events occur (such as a password change or a high-risk sign-in detected later), limiting the window of opportunity for stolen token abuse.
-
Enforce Phishing-Resistant MFA: Transition from SMS or app-based notification codes (which are susceptible to MFA fatigue and push bombing attacks) to FIDO2/WebAuthn security keys or Certificate-Based Authentication (CBA).
-
Number Matching: Ensure your Authenticator App policies require number matching for MFA prompts. This prevents accidental approvals and sophisticated push notification attacks.
Conclusion
MFA is a vital layer of security, but it is not a finished wall. In the hands of a skilled attacker, a valid credential paired with a gap in coverage is still a master key. By understanding where your identity provider's visibility ends and where your Windows environment begins, you can close the gaps and stop assuming that "MFA Enabled" equals "Secured."
Related Resources
Security Arsenal Alert Triage Automation AlertMonitor Platform Book a SOC Assessment platform Intel Hub
Is your security operations ready?
Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.