HomeIntelligenceBrief
🔓 BREACH BRIEF🟠 High🔍 ThreatIntel

Social Engineering MFA Bypass Surge: Attackers ‘Invite’ Themselves Into IAM Systems

Cisco Talos warns that attackers are increasingly using social‑engineering tricks to harvest MFA codes, effectively inviting themselves into identity‑access environments. The trend threatens any organization that relies on MFA for third‑party access, making credential compromise a critical TPRM risk.

🛡️ LiveThreat™ Intelligence · 📅 March 20, 2026· 📰 blog.talosintelligence.com
🟠
Severity
High
🔍
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
2 sector(s)
Actions
3 recommended
📰
Source
blog.talosintelligence.com

Social Engineering MFA Bypass Surge: Attackers “Invite” Themselves Into IAM Systems

What Happened — Cisco Talos reports a dramatic rise in MFA‑spray and “invite‑in” attacks where threat actors manipulate victims into revealing one‑time authentication codes. Phishing kits proxy legitimate login pages and real‑time voice‑social‑engineering tricks harvest MFA tokens, granting attackers valid sessions.

Why It Matters for TPRM

  • MFA is a cornerstone control for third‑party access; its compromise nullifies segmentation and authentication safeguards.
  • A successful “invite‑in” attack can give adversaries unfettered access to vendor portals, cloud environments, and supply‑chain systems.
  • The 178 % surge in fraudulent device registrations signals a broader push to subvert identity‑centric defenses across multiple industries.

Who Is Affected — Enterprises relying on IAM platforms, SaaS providers, MSPs, and any organization that enforces MFA for third‑party access.

Recommended Actions — Review MFA implementation for phishing resistance, enforce out‑of‑band verification, deploy anti‑phishing training focused on real‑time code requests, and monitor for anomalous device registration activity.

Technical Notes — Attack vector: phishing (voice‑social‑engineering, credential‑phishing kits) that captures valid MFA tokens. No specific CVE cited. Data at risk includes privileged credentials and session tokens, enabling lateral movement and data exfiltration. Source: Cisco Talos – “You have to invite them in”

📰 Original Source
https://blog.talosintelligence.com/you-have-to-invite-them-in/

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.