Synergy IT Solutions logo Synergy IT Solutions logo
  • Services
    • IT Navigator
    • Modern Work
    • Device as a Service
    • Technology Sourcing
  • Industries
    • Education
    • Finance
    • Healthcare
    • Legal
    • Local Government
    • Manufacturing
  • Blog
  • About
    • Leadership
    • History
    • Careers
  • Request a consultation
    • All
    • cybersecurity
    • Asset Lifecycle Management
    • Leadership
    • AI
    • IT Advisors
    • IT Navigator
    • News
    • Remote Work
    • Technology
    • Synergy
    • fintech
    • Hybrid
    • Microsoft Teams
    • SOC II
    • Strategy
    • Unified Communications
    • localbusiness
    • phishing
    • Automation
    • Awards
    • Cloud
    • Deployments
    • Integrated IT Management
    • Work
    • assessments
    • small business
  • cybersecurity

What a Difference a Year Makes

Lynne Caputi Lynne Caputi Oct 24, 2024

A New Cyber-Attack is Gaining Ground

What a difference a year makes. Just last year, we were urging clients to set up multifactor authentication (MFA) to protect cloud and remote access accounts. Now, a new, highly sophisticated cyber threat, the Adversary-in-the-Middle (AiTM) attack, is successfully bypassing even MFA, catching many organizations off guard. Here’s how to protect against these escalating attacks and secure your accounts and resources.

Why AiTM is Different—and Dangerous

AiTM attacks use phishing emails to lure users into clicking seemingly legitimate links, like those “from Microsoft” asking to verify credentials. By imitating familiar interfaces, attackers can capture login details and MFA session tokens in a single strike. Once they have that token, they gain extended access to email, Teams, and cloud data for up to 90 days—without requiring the user to log in again. Even low-skill bad actors can now use these attacks, thanks to “Phishing-as-a-Service” and easily accessible attack kits.

How AiTM Attacks Unfold

  1. Phishing email bait: A user clicks a seemingly innocuous link, like one from “Microsoft” to confirm their account.

  2. Fake login site: The link directs the user to a convincing replica login page that captures credentials while forwarding the credentials to the real Microsoft login.

  3. MFA token hijacking: The user completes MFA, thinking they are secure. However, both the credentials and session token have been stolen, allowing unrestricted access.

Key Takeaways

  • Avoid clicking email links. If an email requests verification, go directly to portal.microsoft.com in a browser and sign yourself in to verify your account.

  • Use a password manager. If the site isn’t legitimate, they won’t autofill credentials—providing a clear red flag that the link is fraudulent.


Bringing It All Together

In short, the rapid evolution of these attacks highlights the ongoing need for vigilance, continual cybersecurity education, and policy updates. As AiTM and similar threats evolve, sticking to basics and using the right tools remain powerful first steps in maintaining a secure environment.

This article was created in collaboration with Josh Zimmerman.

Topics discussed

  • cybersecurity

Related Posts

cybersecurity Safeguard Your Business with Multi-Factor Authentication: Why It's Essential
Read more
Dec 05, 2023
AI Microsoft Copilot is Here! But...Are You Ready?
Read more
Feb 06, 2024

Subscribe via email

Subscribe to our blog to get insights sent directly to your inbox.

Subscribe via email

Subscribe to our blog to get insights sent directly to your inbox.

footer-logo

Locations

Buffalo

452 Sonwil Dr.
Buffalo, NY 14225

716.250.3200

Rochester

3500 Winton Pl., #4
Rochester, NY 14623

585.758.7100

Syracuse

6443 Ridings Rd, #130
Syracuse, NY 13206

315.457.4444

Ithaca

25 Dutch Mill Rd.
Ithaca, NY 14850

607.257.3524

Explore

  • Services
  • Industries
  • Blog
  • About
©2025 Synergy IT Solutions. All rights reserved.
Privacy Policy Terms of Service Trust Center
  • LinkedIn
  • Facebook
  • Twitter