The alert hit at 02:14 UTC. Multi-Factor Authentication logs lit up with failed push requests, SMS codes, and unexpected token issuance. Someone was probing the edges of your defenses, and the clock was already running.
Multi-Factor Authentication (MFA) is not a magic shield. It reduces risk, but it can be attacked, bypassed, or manipulated through phishing, SIM swapping, prompt bombing, or MFA fatigue attacks. When an incident occurs, speed and precision decide whether you contain the breach or watch it expand.
A strong MFA incident response plan starts with clear detection signals. Centralize audit logs from all MFA providers. Monitor for abnormal patterns: repeated prompts to a single account, time zone mismatches, authentication from TOR exit nodes, device fingerprint anomalies. Flag and escalate in real-time.
Containment is the next priority. Force re-authentication for affected accounts. Disable risky factors, such as SMS, if an active bypass is suspected. Apply conditional access policies to block high-risk IP ranges or enforce hardware keys only. Do not assume the attacker stops at one account—review recent changes to privileged roles and API tokens immediately.