2026-03-21 | Cybersecurity Threat Landscape | Oracle-42 Intelligence Research
```html

Adversary-in-the-Middle (AiTM) Phishing: The Rise of MFA-Bypass Techniques via Reverse Proxies

Executive Summary: Adversary-in-the-Middle (AiTM) phishing attacks have evolved into a sophisticated method for bypassing Multi-Factor Authentication (MFA) by leveraging reverse proxy frameworks such as Evilginx. These attacks intercept user credentials and authentication cookies in real time, enabling threat actors to impersonate legitimate users and gain unauthorized access to sensitive systems. As of May 2025, AiTM attacks represent a critical escalation in the cyber threat landscape, necessitating immediate defensive strategies and heightened awareness among organizations and individuals alike.

Key Findings

Mechanism of AiTM MFA Bypass Attacks

Adversary-in-the-Middle phishing attacks operate by positioning a malicious reverse proxy between the victim and the legitimate service. This proxy captures all transmitted data, including usernames, passwords, and MFA tokens, before forwarding the request to the real server. The user remains unaware of the interception, as the login flow appears normal.

The process typically involves:

Tools such as Evilginx, Modlishka, and NecroBrowser have been adapted for AiTM campaigns, with Evilginx emerging as a leading framework due to its modular design and support for advanced evasion techniques.

Why MFA is No Longer Enough: A Paradigm Shift in Phishing

While MFA significantly reduces the risk of credential-based attacks, AiTM techniques undermine its effectiveness by targeting the authentication session itself. Traditional MFA methods—such as one-time passwords (OTP) or push notifications—are intercepted during transmission and replayed by the attacker. Once a session token is captured, MFA becomes irrelevant because the attacker inherits an authenticated session.

This shift has prompted threat actors to shift from brute-force and credential stuffing to precision-engineered AiTM phishing, which is harder to detect and more likely to succeed against well-defended organizations.

Real-World Impact and Case Studies (2024–2025)

Recent incidents highlight the growing sophistication of AiTM campaigns:

These attacks demonstrate that even organizations with strong MFA policies remain vulnerable unless additional controls are implemented.

Defensive Strategies: Mitigating AiTM Threats

To counter AiTM MFA bypass attacks, organizations must adopt a multi-layered security approach:

1. Session Token Hardening

2. Enhanced Monitoring and Detection

3. User Education and Phishing Resistance

4. Infrastructure and Architecture Controls

Future Outlook: The Next Evolution of AiTM Attacks

As organizations deploy stricter authentication controls, threat actors are likely to enhance AiTM frameworks with:

The convergence of AI, cloud services, and phishing automation will continue to lower the barrier to entry for AiTM attacks, making them a persistent and escalating threat in the cybersecurity landscape.

Recommendations for Organizations and Users