Home Security Microsoft 365 AiTM Defense
Research bundle

Microsoft 365 AiTM Defense

AiTM phishing steals the session cookie after MFA succeeds, then replays it for full account takeover. Here's how to catch it in your tenant and the controls that make the cookies useless when it happens.

6 artifacts Updated Apr 30, 2026

What this bundle covers

If you run Microsoft 365 and you've kept your eye on phishing trends, you've heard the noise about AiTM. The framing in vendor blogs is usually "this defeats MFA," which is true but loses the nuance. The attack doesn't bypass MFA. It lets MFA happen normally, then walks off with the receipt — the session cookie that Microsoft hands back to prove the user authenticated.

Once the attacker has that cookie, they can paste it into their own browser and skip the entire login flow. No MFA prompt. No password. Just a fully authenticated Outlook session, looking exactly like the user.

This bundle is what we wish we'd had the first time we triaged one of these. Three layers, in this order:

  • The threat model. Read this first. The detections and mitigations only make sense once you understand what step they're breaking.
  • Detections. KQL queries for Sentinel and 365 Defender. Three queries that catch the attack at different stages.
  • Mitigations. Conditional Access policies that make the cookies useless even when they're stolen. Plus the rollout order that doesn't lock your tenant out.
  • Playbook. What to do at 2am when the detection fires.

Who this is for

Anyone running M365 / Azure AD who wants to harden against AiTM. The detections assume Sentinel or Defender XDR. The mitigations assume Conditional Access (P1 or P2). If you're on the free tier, the threat model still applies but your prevention options narrow — focus on phishing-resistant MFA and don't sleep on user awareness.

Status

Live and being added to. Threat model + 3 detections + CA policy guide + IR runbook are published. More coming as we hit them in engagements.

Need help deploying any of this?

Tuning these detections to your tenant, rolling out the Conditional Access policies, designing the IR runbook for your team — we do that work.

Talk to us about an engagement