VFF - The signal in the noise
News

MFA Stops at Login. Attackers Start There.

louiswcolumbus@gmail.com (Louis Columbus)Read original
Share
MFA Stops at Login. Attackers Start There.

MFA successfully authenticates users at login but provides no visibility into what happens after, creating a critical blind spot that attackers exploit through lateral movement and privilege escalation. A CIO at NOV discovered this architectural gap during operational testing, finding that session token theft, not credential compromise, is the primary vector in advanced attacks. With average breach breakout time now 29 minutes and 82% of 2025 detections involving no malware, attackers have shifted to stealing legitimate credentials and session tokens rather than deploying code.

Multi-factor authentication successfully verifies user identity at login but provides no visibility into post-authentication activity, creating a critical architectural gap that attackers exploit through lateral movement and privilege escalation. Recent operational testing at NOV revealed that session token theft, not credential compromise, has become the primary attack vector, with 82% of 2025 detections involving no malware and average breach breakout time now 29 minutes.

  • MFA authenticates login events but offers zero visibility into what authenticated users do after gaining access, leaving a significant security blind spot.
  • Session token theft and lateral movement have replaced credential compromise as the primary attack vector in advanced breach scenarios.
  • The shift to malware-free attacks using legitimate credentials means attackers now focus on stealing and abusing valid access rather than deploying code.
  • With average breakout time at 29 minutes, organizations have a narrow window to detect and respond to post-authentication malicious activity.
  • MFA deployment creates a false sense of security by stopping at the login boundary rather than extending visibility and control across the entire session lifecycle.

As attackers shift from code-based attacks to credential and session token theft, organizations relying solely on MFA for security are leaving their post-authentication environments completely dark, enabling attackers to move laterally and escalate privileges undetected within critical systems. This architectural gap directly impacts breach containment, incident response time, and the ability to prevent lateral movement after initial compromise.

The discovery at NOV highlights a fundamental mismatch between how security controls are deployed and how modern attacks actually unfold. MFA has become standard practice precisely because it effectively prevents unauthorized login attempts, yet this success has created a false sense of boundary protection. Once an attacker gains valid credentials or steals a session token, MFA's protective perimeter ends abruptly, and the attacker operates within a legitimate authentication context. This is particularly dangerous because security monitoring tools often treat authenticated sessions as inherently trustworthy, reducing scrutiny of post-login behavior. The shift toward malware-free attacks reflects adversary sophistication and adaptation. Rather than relying on detectable malicious code, attackers now focus on living-off-the-land tactics using built-in system tools and legitimate access pathways. This approach evades signature-based detection and antivirus systems while remaining invisible to tools that only monitor the login boundary. The 29-minute average breakout time means attackers can move from initial compromise to lateral spread across the enterprise faster than many traditional incident response processes can detect anomalies. Organizations need to shift from perimeter-focused thinking (where MFA stops) to continuous verification models that monitor and validate behavior throughout the entire session, not just at entry points.

The industry has optimized for a threat model that no longer reflects reality. MFA solved the 2015 problem of compromised credentials at scale, but it solved it by drawing a hard line at login and declaring everything beyond that point implicitly safe. Modern attackers have simply adapted to operate on the safe side of that line, using legitimate access to achieve their objectives without triggering the defenses we've positioned at the perimeter. Real security requires shifting from binary decisions at login to continuous risk assessment throughout the session lifecycle, including behavioral analysis, impossible travel detection, and activity pattern anomalies that indicate token compromise or lateral movement.

  1. Audit your current security controls to identify whether visibility and monitoring extend beyond the login event into post-authentication session activity and lateral movement patterns.
  2. Implement continuous authentication and behavioral analytics that monitor user activity after login, not just at the entry point, focusing on anomalous actions relative to user baselines.
  3. Evaluate session management practices including token lifecycle, revocation mechanisms, and detection of token theft or replay attacks occurring within authenticated sessions.
  4. Establish a post-authentication monitoring strategy that tracks privilege escalation attempts, unusual resource access, and lateral movement patterns that occur within the first 30 minutes post-compromise.
Share

Our Briefing

Weekly signal. No noise. Built for founders, operators, and AI-curious professionals.

No spam. Unsubscribe any time.

Related stories

AdventHealth deploys ChatGPT to cut administrative burden
News

AdventHealth deploys ChatGPT to cut administrative burden

AdventHealth is deploying ChatGPT for Healthcare to streamline clinical and administrative workflows, with the goal of reducing administrative burden on staff and freeing up time for direct patient care. The health system is using OpenAI's healthcare-specific model to handle workflow optimization tasks. This represents a practical application of generative AI in healthcare operations rather than clinical decision-making.

about 6 hours ago· OpenAI
AI Discovers Security Flaws Faster Than Humans Can Patch Them

AI Discovers Security Flaws Faster Than Humans Can Patch Them

Recent high-profile breaches at startups like Mercor and Vercel, combined with Anthropic's disclosure that its Mythos AI model identified thousands of previously unknown cybersecurity vulnerabilities, underscore growing demand for AI-powered security solutions. The article argues that cybersecurity vendors CrowdStrike and Palo Alto Networks, which are integrating AI into their threat detection and response capabilities, represent undervalued investment opportunities as enterprises face mounting pressure to defend against both conventional and AI-discovered attack vectors.

23 days ago· The Information
AWS Launches G7e GPU Instances for Cheaper Large Model Inference
TrendingModel Release

AWS Launches G7e GPU Instances for Cheaper Large Model Inference

AWS has launched G7e instances on Amazon SageMaker AI, powered by NVIDIA RTX PRO 6000 Blackwell GPUs with 96 GB of GDDR7 memory per GPU. The instances deliver up to 2.3x inference performance compared to previous-generation G6e instances and support configurations from 1 to 8 GPUs, enabling deployment of large language models up to 300B parameters on the largest 8-GPU node. This represents a significant upgrade in memory bandwidth, networking throughput, and model capacity for generative AI inference workloads.

about 1 month ago· AWS Machine Learning Blog
Anthropic Launches Claude Design for Non-Designers
Model Release

Anthropic Launches Claude Design for Non-Designers

Anthropic has launched Claude Design, a new product aimed at helping non-designers like founders and product managers create visuals quickly to communicate their ideas. The tool addresses a gap for early-stage teams and individuals who need to share concepts visually but lack design expertise or resources. Claude Design integrates with Anthropic's Claude AI platform, leveraging its capabilities to streamline the visual creation process. The launch reflects growing demand for AI-powered design tools that lower barriers to entry for non-technical users.

about 1 month ago· TechCrunch AI