Account Compromise
Phishing is still the primary risk for SMBs
This category was the largest by far – 68% of all breaches – and 95% of those were Adversary‑in‑the‑Middle (AiTM) attacks that steal session tokens, allowing accounts to be phished even if protected by certain types of MFA (i.e SMS, Email OTP, Push Notifications). AiTM kits are ubiquitous and inexpensive; open‑source tools like Modlishka, Evilginx and Muraena lower the technical barrier, making successful campaigns accessible to less‑skilled actors, and there are several AiTM kits for hire for around $75 USD per month, which even include customer service.
For customers in our CSOC, near real‑time detection + automated response typically limits the attacker’s window to 7-10 minutes (log ingestion dependent). That is still enough time for a motivated actor to attempt mailbox scraping or quick exfiltration – and social‑engineering lures remain persuasive.
The overlooked reality
What is often neglected is that there are several easy ways to make your organisation more resilient to this type of attack, and a shocking 60% of these successful AiTM attacks are low level, opportunistic, spray-and-pray type attacks. It’s true that a motivated attacker can use a VPN to appear as though they are in the same country as the victim, and they can manipulate their user agent string to pretend that they are signing in from a Windows 11 device, but the reality of what we see is that attackers, well, don’t.
We still see a large proportion of low‑effort attacks: 60% either include sign‑ins from US‑based IP pools or feature unchanged/non‑spoofed agent strings, or, in many cases, both. In practice, simple CA policies (unsupported platforms + geo‑blocks) would have prevented the majority of these opportunistic intrusions – with minimal disruption to users.
No single control is 100% effective. The objective is friction: raise the cost of compromise, so attackers move on to easier targets.
Mitigations that work (and why many teams skip them)
Phishing‑resistant MFA (passkeys/FIDO2): Rolling out passkeys materially raises the bar for token theft and relay attacks. Start with Microsoft Entra ID’s passkey method and Authenticator support.
Conditional Access (CA) constraints with low user impact:
- Block unknown/unsupported device platforms to cut out opportunistic sign‑ins that present as Linux or non‑standard user agents. Policy template
- Geo‑blocking for countries where you have no operations. This simple control eliminates large volumes of spray‑and‑pray attempts. Block by location