Skip to the main content.

Modernize & Transform

Built to help you reimagine IT operations, empower your workforce, and leverage AI-powered tools to stay ahead of the curve.

Untitled design (3)

Empower My Team

We bring together the best of Microsoft’s cloud ecosystem and productivity tools to help your people thrive.

Untitled design (3)

Build My Infrastructure

We offer a comprehensive suite of infrastructure services tailored to support your business goals today and scale for the future

Untitled design (3)

IT Services

Our managed and co-managed IT service plans deliver a responsive and innovative engagement to support your IT needs, improve employee experience, and drive growth for your business. 

Untitled design (3)

Cybersecurity Services

Sourcepass offers innovative solutions, including SOC, GRC, Security Assessments, and more to protect your business.

Untitled design (3)

Professional Services

Grow your business with cloud migrations, infrastructure refreshes, M&A integrations, staff augmentation, technical assessments, and more.

Untitled design (3)

Resource Library

Stay ahead, stay connected, and discover the future of IT with Sourcepass.

Untitled design (3)

Events & Webinars

Dive into a dynamic calendar of webinars and in-person gatherings designed to illuminate the latest in managed IT services, cybersecurity, and automation.

Untitled design (3)

 

The Sourcepass Story

Sourcepass aims to be different. It is owned and operated by technology, security, and managed services experts who are passionate about delivering an IT experience that clients love.

Untitled design (3)

The Sourcepass Experience

At Sourcepass, we’re rewriting the IT and cybersecurity experience by helping businesses focus on what they do best, while we deliver the infrastructure, insights, and innovation to help them thrive.

Untitled design (3)

 

Post-Breach Cleanup: How to Detect and Remediate MFA Exploits

 
Post-Breach Cleanup: How to Detect and Remediate MFA Exploits

Even with strong cybersecurity defenses, no system is completely immune to compromise. Attackers are constantly developing new ways to bypass multi-factor authentication (MFA), especially when organizations rely on outdated methods such as SMS or app-based codes. Once they gain access, attackers often manipulate MFA settings and Microsoft 365 configurations to maintain persistence and expand their control.

This article explains the most common attacker behaviors following a breach and provides actionable steps to detect and remediate MFA exploits effectively.

 

How Attackers Exploit MFA After a Breach

When attackers bypass MFA, they typically move quickly to establish long-term access. Common tactics include:

  • Registering Additional MFA Methods: Attackers add their own phone numbers, devices, or app registrations so they can continue to log in even if passwords change.

  • Creating Malicious OAuth Applications: By granting themselves third-party app permissions, attackers can maintain access to data and mailboxes without needing credentials.

  • Setting Up Inbox Rules: Rules may be added to hide security alerts or forward sensitive emails to external accounts.

  • Privilege Escalation: Attackers attempt to gain administrative rights, increasing their ability to disable protections or exfiltrate large amounts of data.

These activities can go undetected unless organizations are actively monitoring their Microsoft 365 environment.

 

Detecting MFA Exploits in Microsoft 365

Proactive monitoring is essential for identifying malicious activity. Organizations should:

  1. Audit MFA Methods Regularly
    Review all user accounts for unauthorized MFA registrations. Remove or block suspicious devices immediately.

  2. Monitor OAuth Applications
    Check for newly registered or unfamiliar third-party apps. Malicious OAuth applications often request excessive permissions to access mail, files, or calendars.

  3. Use Microsoft Defender for 365
    Enable alerts for unusual sign-in activity, risky app behavior, and mailbox manipulation. Defender’s automated investigations can help detect anomalies faster.

  4. Review Audit Logs in Microsoft Entra
    Look for suspicious changes in authentication methods, user roles, or app permissions.

 

Remediation Steps After an MFA Exploit

Once a compromise is detected, immediate action is required:

  • Revoke Unauthorized MFA Devices: Remove attacker-registered devices and require re-enrollment for legitimate users.

  • Block Malicious OAuth Applications: Disable or delete applications with suspicious access rights.

  • Reset Credentials and Sessions: Force password resets and revoke all active sign-in sessions to cut off attacker access.

  • Implement Conditional Access Policies: Require phishing-resistant MFA (FIDO2 keys, passkeys) and compliant devices for login.

  • Limit Third-Party App Permissions: Restrict which users can consent to applications and enforce admin approval for high-risk permissions.

 

Reducing Risk Before a Breach Occurs

Post-breach cleanup is critical, but prevention is even more effective. To minimize exposure:

  • Deploy phishing-resistant MFA across all privileged and high-sensitivity accounts.

  • Enforce least privilege access, ensuring users only have the permissions they need.

  • Enable automated detection and response with Microsoft Defender and advanced Microsoft 365 licenses.

  • Train employees to recognize and report suspicious login prompts or MFA notifications.

 

Conclusion

MFA is essential for modern security, but attackers are finding new ways to exploit it once they breach an environment. By understanding attacker behaviors—such as registering new MFA methods, adding OAuth applications, and creating inbox rules—organizations can detect compromises earlier and respond more effectively.

Strong monitoring, rapid remediation, and the adoption of phishing-resistant MFA combined with conditional access policies will significantly reduce the risk of long-term compromise.