How Attackers Steal Tokens and How to Stop Them

Identity Threats: How Attackers Steal Tokens and How to Stop Them

In a recent episode of the Threatscape Podcast, Ru Campbell sat down with Dr Nestori Syynimaa to discuss a major issue in identity security, token theft. The conversation explored how attackers steal authentication tokens, the evolution of Azure AD security, and how organisations can defend against these emerging threats.

Dr Syynimaa shared his journey from CIO to a principal identity security researcher at Microsoft, providing valuable insights into how adversaries exploit identity vulnerabilities and how defenders can stay ahead

The Rise of Token Theft and Identity Attacks

Identity security is critical in modern cyber security. With cloud based infrastructures becoming the norm, authentication tokens have become prime targets for attackers. Instead of stealing passwords, cybercriminals now hijack session tokens, granting them direct access to corporate systems, often bypassing multifactor authentication (MFA).

Dr Syynimaa shared an eye opening experience: a PowerShell tool he originally developed to help IT professionals was unknowingly being used by cyber criminals. This highlights a stark reality, many legitimate administrative tools can be repurposed for malicious activity by attackers.

The discussion also touched on how security research plays a key role in identifying vulnerabilities before they can be exploited, and how Microsoft and other organisations work to mitigate these risks.

How Attackers Steal Tokens and the Emerging Defences

The podcast examined the main methods attackers use to steal tokens:

1. Adversary-in-the-Middle (AiTM) Attacks

AiTM phishing attacks trick users into entering credentials into fake login portals. These attacks capture authentication tokens, allowing attackers to bypass MFA and gain access to victims’ accounts.

2. Post-Issuance Token Theft

Even after authentication, malware on a compromised device can extract stored tokens. Attackers can then use these tokens to impersonate users and navigate corporate networks undetected.

The Microsoft Perspective

As a Microsoft security researcher, Dr Syynimaa discussed how his role allows him to detect and address these issues at an earlier stage. By analysing attack patterns and researching vulnerabilities, he helps build better defences before threats can spread widely.

One notable topic was a Microsoft 365 security loophole, where certain apps unintentionally received elevated API permissions. This issue, which affected conditional access enforcement, was quickly addressed, demonstrating the importance of ongoing security reviews.

Defending Against Token Theft and Identity Compromise

Dr Syynimaa outlined key defence strategies against token theft

Final Thoughts

Token theft is an evolving cybersecurity challenge. As attackers develop more advanced techniques, defenders must remain vigilant and proactive. Security research, strict access policies, and improved authentication methods are key to reducing risk.

For those interested in identity security, Dr Syynimaa recommends attending security conferences, following researchers on social media, and engaging in hands-on cybersecurity exercises like Capture The Flag (CTF) challenges.

Want to learn more?

Follow Dr Nestori Syynimaa online and explore his research on identity security. Subscribe to the Threatscape Podcast for more expert discussions on the latest cybersecurity threats and defences.

Ebook

10 Microsoft 365 Security Settings You Should Not Ignore

You may also be interested in these:

welcome

JOIN OUR nEWSLETTER

Contact Us