Multi-factor authentication (MFA), long considered a cornerstone of cybersecurity defense, is facing a formidable new threat: “Pass-the-Cookie” attacks.
Recent findings reveal from Long Wall shows that threat actors exploit browser session cookies to bypass MFA entirely, granting full access to corporate accounts without requiring passwords or authentication tokens.
This technique poses a significant risk to organizations reliant on MFA for Office 365, Azure, and other cloud platforms.
MFA’s effectiveness hinges on verifying user identity through multiple credentials. However, attackers now target session cookies—small data fragments stored by browsers to maintain active logins.
In a typical attack, cybercriminals steal cookies like Microsoft’s ESTSAUTH, which validates sessions across Office 365 services.
Once extracted, these cookies enable adversaries to impersonate users indefinitely, even from unrecognized devices or locations.
A stark example involves two Office 365 sign-ins logged in Azure:
Azure’s logs show near-identical entries for both events, with only subtle differences in browser/OS metadata hinting at foul play.
Without advanced detection tools, these attacks easily evade traditional security monitoring.
Session hijacking begins when malware like LummaC2, Redline, or Racoon infiltrates a device. These infostealers—often disguised as fake software updates—scan browsers for cookies and decrypt them using built-in tools.
For instance, LummaC2 exfiltrates ESTSAUTH values, which attackers then implant into their own browsers via developer consoles.
Proof-of-Concept Walkthrough:
This method bypasses MFA because the cookie validates the session, not the user.
Microsoft’s documentation confirms ESTSAUTH cookies persist until explicit logout or expiration—potentially enabling weeks of undetected access.
As MFA adoption grows, attackers are shifting from credential theft (e.g., Mimikatz-based LSASS dumping) to cookie harvesting.
Recent campaigns observed by MSSPs show a 300% increase in cookie theft attempts since 2023, targeting sectors like finance and healthcare.
Why Cookies?
Using the definition from Microsoft: (https://learn.microsoft.com/en-us/entra/identity/authentication/concept-authentication-web-browser-cookies)
To counter this threat, experts recommend:
While MFA remains essential, the “Pass-the-Cookie” epidemic underscores the need for zero-trust architectures.
As Jake Williams, CTO of Rendition Infosec, notes: “Session cookies are the new credentials. Protecting them requires the same rigor as passwords—encryption, rotation, and granular access controls.”.
Organizations must evolve beyond MFA alone, treating session integrity as a critical pillar of modern cybersecurity.
Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free
A sophisticated cyberespionage campaign linked to Chinese state-sponsored actors has exploited a previously patched Check…
A critical security flaw (CVE-2025-20059) has been identified in supported versions of Ping Identity’s PingAM…
A sophisticated malware campaign leveraging GitHub repositories disguised as game modifications and cracked software has…
Netskope Threat Labs uncovered a sprawling phishing operation involving 260 domains hosting approximately 5,000 malicious…
A new wave of cyberattacks leveraging the Winos4.0 malware framework has targeted organizations in Taiwan…
A sweeping analysis of the Common Crawl dataset—a cornerstone of training data for large language…