Attacking the Client: MFA Bypass Targeting Workstations

Ymir Vigfusson

April 2, 2025

Cybercriminals are relentless and resourceful in their pursuit of vulnerabilities, and company employees and contractors often find themselves at the front line. By targeting workstations, attackers can bypass even Multi-Factor Authentication (MFA) systems, posing serious security risks. Workstations, as everyday tools for accessing sensitive data and performing critical tasks, represent a rich attack surface that, when exploited, can lead to data breaches, financial loss, and a compromise of organizational integrity.

Understanding client-based attack vectors is crucial. It’s no longer enough to rely solely on MFA or Endpoint Detection and Response (EDR) solutions. A deeper, multi-layered approach is essential to protect against the evolving tactics cybercriminals use to bypass identity security controls at the client level.

Workstation Vulnerabilities and MFA Bypass Techniques

Workstations expose attack surface vulnerabilities that are a prime target for attackers seeking to burrow into an organization. These weaknesses can include outdated software, misconfigured settings, or malicious code embedded in websites and applications. Whether through targeted social engineering attacks or broad campaigns, attackers leverage these vulnerabilities to manipulate the control flow on the computer and gain unauthorized access, often flying under the radar of traditional security measures.

Once attackers have landed on the workstation with remote access, here are some of the key techniques attackers use to expand their access:

Stealing Tokens

One of the primary methods attackers use to exploit existing trust relationships, including bypassing MFA, involves stealing session tokens. These tokens serve as proof of a user’s authenticated session, and once compromised, they allow attackers to hijack the session without triggering MFA challenges.

  • Session Hijacking: Attackers infiltrate devices and steal authentication cookies, tickets, or tokens, effectively taking control of authenticated sessions. Tools on "Phishing-as-a-Service" platforms streamline this process, making it easy for attackers to perform social engineering, exfiltrate session tokens, and gain unauthorized access. This approach has been documented in numerous cases, including real-world examples of attackers using advanced phishing kits to bypass MFA.
  • OAuth 2.0 Vulnerabilities: OAuth tokens, often used for authorizing third-party applications, can also be a weak link. Attackers exploit flaws in OAuth implementations through methods like Cross-Site Scripting (XSS) or HTML injection, enabling them to intercept or forge tokens and bypass MFA. A notable instance occurred in April 2022, when attackers stole OAuth tokens from Heroku and Travis CI, leading to unauthorized access to private GitHub repositories.
  • Man-in-the-Browser Attacks: Malware that alters browser behavior can intercept or modify transactions even after successful MFA authentication. These attacks can change payment details or manipulate other sensitive information displayed in the browser, making it appear as though the actions were legitimate. This tactic has been widely used in various financial sector attacks to steal funds, cryptocurrency, and data.

Abusing Trusted Components

Beyond token theft, attackers also target trusted components within applications, exploiting the complex web of dependencies that modern workstations rely on.

  • Supply Chain Attacks: By compromising software update processes, attackers can distribute malware that circumvents authentication directly. For example, the 2023 UAParser.js backdoor in the npm ecosystem showed how attackers could exploit dependencies to inject malicious code, effectively bypassing MFA and impacting a wide range of applications.
  • Server-Side Attacks: Attacks on backend components can also undermine client-based authentication. The high-profile 2020 SolarWinds breach demonstrated how trusted external components could be exploited to undermine security processes and bypass MFA, allowing attackers to persist within compromised environments undetected.

These techniques highlight the sophisticated methods attackers use to slither into organizations via workstations, including bypassing MFA protections that should keep them at bay. Traditional security measures often fall short, as they focus on endpoint protection without addressing the underlying trust relationships that attackers manipulate.

The Main Challenge

Attacks on workstations underscore a critical challenge in cybersecurity: the need for a multi-layered approach that extends beyond basic MFA and EDR solutions. Attackers exploit weaknesses in client-side components, manipulating authentication flows and trusted relationships to bypass security controls. As these threats evolve, organizations must recognize that defending workstations requires more than endpoint protection—it demands a comprehensive strategy that harmonizes monitoring, intent-based authentication, and a proactive stance on emerging threats.

The Case for Intent-Based Authentication

As attackers refine their strategies, it's clear that conventional security measures alone are insufficient. Organizations need a security framework that anticipates and disrupts these advanced attacks. Intent-based authentication offers a new, versatile security layer by continuously verifying that actions and commands originate from the intended physical workstation, rather than from compromised tokens or credentials. 

Conclusion

The battle against MFA bypass techniques is ongoing, and the key to staying ahead lies in embracing an adaptive, intent-based security posture that accounts for the evolving nature of workstation vulnerabilities. By focusing on the intent behind actions rather than just the authentication checkpoints, organizations can better protect against these sophisticated attacks and safeguard their critical assets.

Deploy Keystrike in 20 Minutes

Try Keystrike in Your Environment for 30 Days