The MFA was enabled…
but the attacker still got in.
That is when things stop making sense.
MFA was on. No brute force. No password spray. No obvious compromise.
Just a normal day… until the activity did not match the user.
What we found
A legitimate user account. Successful MFA authentication. But access appeared from unfamiliar locations and the session behaviour did not line up with the user.
What actually happened?
Instead, the attacker reused an already authenticated session. Once MFA has been completed, a session token can allow continued access. If that token is stolen, exposed or reused, the attacker may be able to walk straight in as the user.
Why MFA is not the finish line
This is where many Microsoft 365 environments fall short. They enable MFA and assume the job is done. But if sessions are not controlled, devices are not validated and token activity is not monitored, risk can still exist.
What we hunted
- 1
- 2
- 3
- 4
- 5
SigninLogs | where ResultType == 0 | summarize count(), Locations = make_set(Location) by UserPrincipalName, bin(TimeGenerated, 1h) | where array_length(Locations) > 1
How to read this query
Successful sign-ins without obvious failure patterns
Access that does not match normal working behaviour
Mobile network changes
Travelling users
Remote access from known locations
Review Conditional Access decisions
Inspect mailbox, SharePoint and app activity after sign-in
What this kind of activity can indicate
What should be in place?
Agent Foskett’s takeaway
MFA is essential, but it is not the finish line. It is the starting point. Real Microsoft 365 security means validating the user, the device, the session and the behaviour after sign-in.
Where this becomes real
That is the difference between having security features turned on and knowing they are actually protecting the business.
