What this bundle covers
If you run Microsoft 365 and you've kept your eye on phishing trends, you've heard the noise about AiTM. The framing in vendor blogs is usually "this defeats MFA," which is true but loses the nuance. The attack doesn't bypass MFA. It lets MFA happen normally, then walks off with the receipt — the session cookie that Microsoft hands back to prove the user authenticated.
Once the attacker has that cookie, they can paste it into their own browser and skip the entire login flow. No MFA prompt. No password. Just a fully authenticated Outlook session, looking exactly like the user.
This bundle is what we wish we'd had the first time we triaged one of these. Three layers, in this order:
- The threat model. Read this first. The detections and mitigations only make sense once you understand what step they're breaking.
- Detections. KQL queries for Sentinel and 365 Defender. Three queries that catch the attack at different stages.
- Mitigations. Conditional Access policies that make the cookies useless even when they're stolen. Plus the rollout order that doesn't lock your tenant out.
- Playbook. What to do at 2am when the detection fires.
Who this is for
Anyone running M365 / Azure AD who wants to harden against AiTM. The detections assume Sentinel or Defender XDR. The mitigations assume Conditional Access (P1 or P2). If you're on the free tier, the threat model still applies but your prevention options narrow — focus on phishing-resistant MFA and don't sleep on user awareness.
Status
Live and being added to. Threat model + 3 detections + CA policy guide + IR runbook are published. More coming as we hit them in engagements.