Cyber Security News

New Pass-the-Cookie Attacks Bypass MFA, Giving Hackers Full Account Access

Multi-factor authentication (MFA), long considered a cornerstone of cybersecurity defense, is facing a formidable new threat: “Pass-the-Cookie” attacks.

Recent findings reveal from Long Wall shows that threat actors exploit browser session cookies to bypass MFA entirely, granting full access to corporate accounts without requiring passwords or authentication tokens.

This technique poses a significant risk to organizations reliant on MFA for Office 365, Azure, and other cloud platforms.

The Illusion of Security

MFA’s effectiveness hinges on verifying user identity through multiple credentials. However, attackers now target session cookies—small data fragments stored by browsers to maintain active logins.

In a typical attack, cybercriminals steal cookies like Microsoft’s ESTSAUTH, which validates sessions across Office 365 services.

screenshots from the Azure sign-in logs

Once extracted, these cookies enable adversaries to impersonate users indefinitely, even from unrecognized devices or locations.

Different methods used to authenticate

A stark example involves two Office 365 sign-ins logged in Azure:

  1. Legitimate Access: A user logs in via Chrome on Windows 11, completing MFA via the Microsoft Authenticator app.
  2. Malicious Access: An attacker uses the same account on Ubuntu/Firefox with no password or MFA prompt—relying solely on a stolen ESTSAUTH cookie.

Azure’s logs show near-identical entries for both events, with only subtle differences in browser/OS metadata hinting at foul play.

Without advanced detection tools, these attacks easily evade traditional security monitoring.

Cookie Hijacking

Session hijacking begins when malware like LummaC2, Redline, or Racoon infiltrates a device. These infostealers—often disguised as fake software updates—scan browsers for cookies and decrypt them using built-in tools.

For instance, LummaC2 exfiltrates ESTSAUTH values, which attackers then implant into their own browsers via developer consoles.

Proof-of-Concept Walkthrough:

  1. Cookie Extraction: After compromising a Windows/Chrome device, attackers use browser dev tools to copy the ESTSAUTH cookie from login.microsoftonline.com.
  2. Session Spoofing: On a clean Ubuntu/Firefox machine, the attacker creates a new cookie with the stolen value. Refreshing the page grants immediate access to the victim’s Office 365 account.

This method bypasses MFA because the cookie validates the session, not the user.

Microsoft’s documentation confirms ESTSAUTH cookies persist until explicit logout or expiration—potentially enabling weeks of undetected access.

The Rise of Cookie-Centric Attacks

As MFA adoption grows, attackers are shifting from credential theft (e.g., Mimikatz-based LSASS dumping) to cookie harvesting.

Using procdump to perform a full memory dump on LSASS, then using Mimikatz to extract NTLM, Kerberos & LSA secrets.
Using Mimikatz to target the encrypted data storage in Chrome, decrypt the data and show the credentials

Recent campaigns observed by MSSPs show a 300% increase in cookie theft attempts since 2023, targeting sectors like finance and healthcare.

Why Cookies?

  • Persistence: Cookies often outlive password rotations.
  • Stealth: No brute-force attempts or MFA triggers to alert defenders.
  • Cross-Platform Usability: Cookies work across devices and geographies.

Using the definition from Microsoft: (https://learn.microsoft.com/en-us/entra/identity/authentication/concept-authentication-web-browser-cookies)

cookie via a console command or simply right clicking in the storage section

Mitigation Strategies

To counter this threat, experts recommend:

  1. Session Token Monitoring: Deploy UEBA (User Entity Behavior Analytics) tools to flag anomalies like sudden OS/browser changes mid-session.
  2. Conditional Access Policies: Restrict logins to compliant/managed devices and enforce recurring MFA checks for high-risk actions.
  3. Cookie Encryption: Use solutions like Azure AD’s Continuous Access Evaluation (CAE) to shorten token lifespans and bind sessions to device fingerprints.
  4. Infostealer Detection: Block unauthorized credential dumping via EDR tools and restrict local admin privileges.

While MFA remains essential, the “Pass-the-Cookie” epidemic underscores the need for zero-trust architectures.

As Jake Williams, CTO of Rendition Infosec, notes: “Session cookies are the new credentials. Protecting them requires the same rigor as passwords—encryption, rotation, and granular access controls.”.

Organizations must evolve beyond MFA alone, treating session integrity as a critical pillar of modern cybersecurity.

Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

Hack The box “Ghost” Challenge Cracked – A Detailed Technical Exploit

Cybersecurity researcher "0xdf" has cracked the "Ghost" challenge on Hack The Box (HTB), a premier…

2 hours ago

Sec-Gemini v1 – Google’s New AI Model for Cybersecurity Threat Intelligence

Google has unveiled Sec-Gemini v1, an AI model designed to redefine cybersecurity operations by empowering…

2 hours ago

U.S. Secures Extradition of Rydox Cybercrime Marketplace Admins from Kosovo in Major International Operation

The United States has successfully extradited two Kosovo nationals, Ardit Kutleshi, 26, and Jetmir Kutleshi,…

8 hours ago

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti Connect…

2 days ago

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing how…

2 days ago

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of operational…

2 days ago