How Is AI Helping Threat Actors Bypass Multi-Factor Authentication?

In 2025, threat actors are using AI to bypass Multi-Factor Authentication (MFA) by automating sophisticated, real-time phishing attacks. By leveraging AI to generate convincing lures and to power Adversary-in-the-Middle (AiTM) toolkits, attackers can intercept credentials and MFA codes to hijack user sessions at scale. This detailed analysis explains the specific techniques AI uses to defeat common MFA methods like push notifications and one-time passwords. It explores the drivers behind this critical threat, breaks down the automated attack workflow, and provides a CISO's guide to the necessary defensive shift toward truly phishing-resistant, cryptographic authentication like FIDO2 and Passkeys.

Aug 6, 2025 - 17:18
Aug 19, 2025 - 15:44
 0  2
How Is AI Helping Threat Actors Bypass Multi-Factor Authentication?

Table of Contents

The Human Bypass: AI's Role in Defeating MFA

In 2025, AI is helping threat actors bypass Multi-Factor Authentication (MFA) systems not by breaking their underlying cryptography, but by automating and perfecting the art of human deception at a massive scale. The primary roles AI plays are as the engine for real-time phishing proxies (AiTM) that steal valuable session cookies, the orchestrator of large-scale MFA fatigue attacks designed to overwhelm users, and the voice behind deepfake social engineering campaigns that trick IT help desks into resetting accounts entirely.

The Old Trick vs. The New Automation: The Manual Phish vs. The AI-in-the-Middle

Traditional attempts to bypass MFA were manual and clumsy. An attacker would use a static phishing page to steal a user's password, then have to rush to use that password and a subsequently phished MFA code before it expired. This process was slow, had a high failure rate, and was extremely difficult to scale.

The new, AI-powered method is a seamless, automated interception. Attackers deploy an "Adversary-in-the-Middle" (AiTM) phishing kit where an AI bot acts as a high-speed proxy between the victim and the real service. The AI bot automates the entire login relay process in milliseconds, capturing not just the credentials and the one-time code, but the most valuable prize: the post-authentication session cookie. This makes the MFA bypass far more reliable and dangerously efficient.

Why This Is the Critical Authentication Threat of 2025

The weaponization of AI against MFA has become a critical threat for all businesses, including the dense corporate environments of India's tech cities, due to a perfect storm of factors.

Driver 1: The Universal Adoption of MFA: As nearly every organization has adopted MFA as a baseline security control, attackers have been forced to evolve. Simple password theft is no longer sufficient, so they have invested heavily in AI-powered tools and techniques to bypass this new layer of security.

Driver 2: The Proliferation of AI-Powered AiTM Kits: Sophisticated AiTM frameworks are now available as easy-to-deploy kits on the dark web. These kits have AI-powered backends that handle the real-time credential and session hijacking, allowing even less-skilled attackers to defeat common forms of MFA.

Driver 3: The Power of Generative AI for Deception: Generative AI's ability to create perfect, hyper-personalized phishing emails at scale has made the initial lure that starts the attack sequence far more effective and much harder for employees to detect.

Anatomy of an Attack: The Real-Time AI Phishing Workflow

A modern AI-driven MFA bypass attack is a model of ruthless efficiency:

1. The AI-Generated Lure: An employee receives a highly convincing phishing email about an "urgent security update to the internal VPN." The email, written by a Large Language Model, is contextually relevant and grammatically perfect.

2. The AI Proxy Site: The link in the email leads to a phishing site managed by an AI bot. This site is a visually identical proxy of the real login portal.

3. The Real-Time Relay: When the user enters their username and password on the fake site, the AI bot instantly submits these credentials to the legitimate service in the background.

4. The MFA Interception: The legitimate service, accepting the valid password, sends an MFA challenge (e.g., a push notification or an OTP) to the user. The AI bot's fake site immediately displays a prompt asking the user to approve the sign-in or enter their code.

5. Session Hijacking: The user approves the push or enters the OTP. The AI bot intercepts this, completes the login on the real site, and most importantly, steals the resulting session cookie. The user is then redirected to the real website, often unaware a compromise has occurred, while the attacker now has the session cookie and full access to the account.

Comparative Analysis: How AI Augments Each Stage of the MFA Bypass

This table breaks down the key roles AI plays in modern MFA bypass attacks.

Attack Stage Traditional Method How AI Helps Threat Actors (2025)
The Lure (Phishing Email) A generic, often poorly written email template sent to a large list of targets. Generative AI crafts hyper-personalized, context-aware, and grammatically perfect emails at scale for higher credibility.
The Phishing Site A static, reusable HTML template that is easily identified by security tools and blocklisted. Generative AI creates dynamic, polymorphic versions of the phishing site for each visitor, evading signature-based detection.
The Login & MFA Relay A slow, manual, and error-prone process where the human attacker races against the clock of an expiring MFA token. An AI bot automates the entire credential and MFA relay in milliseconds, ensuring a high rate of success in hijacking the session.
The Recovery Bypass A human attacker attempts to impersonate a user and social engineer a help desk agent over the phone. A deepfake voice clone is used to perfectly mimic the user's voice, deceiving the help desk agent into resetting their MFA.

The Core Challenge: Exploiting the Human Weak Link in the Chain

The fundamental challenge in defending against these attacks is that AI is not breaking the technology of MFA; it is breaking the human. These techniques are expertly designed to exploit universal human traits: the tendency to trust, the desire to be helpful, and the frustration with repetitive interruptions (in the case of MFA fatigue). Security systems that rely on a human making the correct, vigilant decision every single time are destined to fail when faced with an adversary that can launch thousands of convincing, automated deceptions per hour.

The Future of Defense: The Urgent Shift to Phishing-Resistant Authentication

Because the human element is being so effectively targeted, the future of defense lies in removing the possibility of human error from the equation. This means a widespread enterprise shift away from "phishable" MFA methods like SMS codes, push notifications, and one-time passwords (OTP). The clear and urgent path forward is the adoption of phishing-resistant, cryptographic authentication based on the FIDO2/WebAuthn standards. These methods, which include technologies like Passkeys and physical hardware security keys, bind the authentication credential to the physical device and the legitimate website's domain, making it technically impossible for the credential to be used on a phishing site.

CISO's Guide to Hardening Your MFA Strategy

CISOs must act now to evolve their MFA posture beyond legacy methods that are now demonstrably beatable at scale.

1. Prioritize the Rollout of Phishing-Resistant MFA: Begin an immediate strategic initiative to adopt FIDO2/WebAuthn and Passkeys, starting with your most privileged users (administrators, executives) and your most critical applications. This is the single most effective technical control.

2. Aggressively Train for Modern MFA-Specific Threats: Update your security awareness training to move beyond generic phishing. Create specific modules that simulate MFA fatigue attacks and teach users that they must deny any unexpected or unsolicited push notifications, every single time.

3. Harden Help Desk Identity Verification Procedures: Mandate stricter identity verification for any request to reset or re-enroll MFA. A successful response to simple knowledge-based questions is no longer sufficient. This process must be augmented with more robust methods, such as live video verification.

Conclusion

AI is helping threat actors bypass Multi-Factor Authentication by automating the process of human deception at a massive and highly efficient scale. By using AI to create perfect lures and to execute the complex mechanics of real-time session hijacking, attackers have rendered many popular MFA methods vulnerable. The clear path forward for enterprise security is a rapid and decisive move away from a reliance on phishable authentication methods and towards a new generation of truly phishing-resistant, cryptographic standards.

FAQ

What is Multi-Factor Authentication (MFA)?

MFA is a security method that requires a user to provide two or more verification factors to gain access, such as a password (something you know) and a code from your phone (something you have).

What is an AiTM attack?

AiTM, or Adversary-in-the-Middle, is a phishing attack where an attacker's server acts as a proxy between the victim and the real website to intercept credentials and session cookies in real-time.

What is a session cookie?

A session cookie is a piece of data a website stores on your computer after you log in. As long as your browser presents this cookie, you remain authenticated. Stealing it is the goal of an AiTM attack.

What is MFA Fatigue?

It is an attack where an attacker who has a user's password repeatedly triggers MFA push notifications, hoping the user will approve one out of annoyance or confusion.

How does a deepfake voice bypass MFA?

It bypasses the recovery process. An attacker uses a cloned voice to call the IT help desk and trick a support agent into resetting the user's MFA settings, allowing the attacker to enroll their own device.

Is push-based MFA no longer secure?

While better than SMS, simple push notifications are vulnerable to both AiTM attacks (where you approve the attacker's login) and MFA Fatigue attacks. They are not considered phishing-resistant.

Is SMS-based MFA secure?

No, SMS is considered the weakest form of MFA. It is vulnerable to phishing and to SIM swap attacks, where an attacker takes control of the victim's phone number.

What is FIDO2/WebAuthn?

FIDO2 is an open set of standards for secure, passwordless authentication. WebAuthn is its web component, allowing browsers to use phishing-resistant credentials like Passkeys or hardware keys.

What is a Passkey?

A Passkey is a modern, phishing-resistant credential based on the FIDO2 standard that is stored on a device (like your phone) and lets you log in using biometrics. It is cryptographically tied to the website's domain.

How does a Passkey stop this attack?

A Passkey created for "google.com" will simply refuse to work on the attacker's phishing site, "google-login.com." The underlying cryptography prevents the credential from being used on the wrong domain.

What is the role of Generative AI in the lure email?

Generative AI can write thousands of unique, personalized, and grammatically perfect phishing emails at scale, making them far more credible and likely to trick an employee than older, generic templates.

What does it mean for a phishing site to be "polymorphic"?

It means that the underlying code of the site is uniquely generated for every visitor. This allows it to evade security tools that look for the known signatures or fingerprints of common phishing kits.

Can this attack steal my one-time password (OTP)?

Yes. In an AiTM attack, the fake site will ask you to enter the OTP from your authenticator app, and the AI bot will instantly relay that code to the real website to complete the login.

Why is the session cookie so valuable?

Because it grants full access to an account without needing the password or MFA again, for as long as the session is valid (which can be hours or days).

As a user, what is the best thing I can do?

Use the most phishing-resistant MFA method a service offers (Passkey > hardware key > authenticator app). Be extremely suspicious of any unexpected login prompts, and always check the URL in your browser's address bar.

What is "number matching" in MFA?

It is a more secure version of push notifications where the login screen displays a number, and the user must type that same number into their authenticator app. This prevents accidental approvals.

Can an AI bot really interact with a website?

Yes. AI-powered bots can programmatically navigate websites, fill in forms, and respond to challenges just like a human user, only much faster.

Is the goal of these attacks always financial?

Often, but not always. The goal can also be espionage (to gain access to a corporate email account) or to establish a foothold in a network for a larger attack.

How does this affect small businesses?

The automation provided by these AI kits makes it easy for attackers to target thousands of businesses at once. Small businesses that use common cloud services are a primary target.

What is the most important defensive strategy for a company?

The single most important strategy is to create and execute a plan to migrate the entire organization, especially privileged users, away from phishable MFA methods to phishing-resistant standards like FIDO2 and Passkeys.

What's Your Reaction?

Like Like 0
Dislike Dislike 0
Love Love 0
Funny Funny 0
Angry Angry 0
Sad Sad 0
Wow Wow 0
Rajnish Kewat I am a passionate technology enthusiast with a strong focus on Cybersecurity. Through my blogs at Cyber Security Training Institute, I aim to simplify complex concepts and share practical insights for learners and professionals. My goal is to empower readers with knowledge, hands-on tips, and industry best practices to stay ahead in the ever-evolving world of cybersecurity.