Multi-Factor Authentication Request Generation
Adversaries may attempt to bypass multi-factor authentication (MFA) mechanisms and gain access to accounts by generating MFA requests sent to users. Adversaries in possession of credentials to [Valid Accounts](https://attack.mitre.org/techniques/T1078) may be unable to complete the login process if they lack access to the 2FA or MFA mechanisms required as an additional credential and security control. To circumvent this, adversaries may abuse the automatic generation of push notifications to MF...
BY SOURCE
PROCEDURES (12)
Auto-extracted: 3 detections for suspicious
Auto-extracted: 3 detections for azure
Auto-extracted: 3 detections for privilege
Auto-extracted: 2 detections for aws
Auto-extracted: 2 detections for bypass
Auto-extracted: 2 detections for authentication monitoring
Auto-extracted: 2 detections for persist
Auto-extracted: 2 detections for credential
Auto-extracted: 1 detections for event log
Auto-extracted: 1 detections for bypass
Auto-extracted: 1 detections for event log
Auto-extracted: 1 detections for script execution monitoring