Emerging Threats
7 min read

MFA Won't Save You: Why Token Theft Is Healthcare's Next Crisis

Attackers don't need your password anymore. They're stealing session tokens after MFA approval, and healthcare organizations running Microsoft 365 are prime targets. MFA is necessary but it's not the finish line.

GuardsArm Team

Security Experts

February 27, 2026

You rolled out MFA across your entire healthcare org. Enforced it on every account. You feel good about it. You should.

But I need to tell you something uncomfortable: MFA isn't the wall you think it is. Not anymore.

Attackers have moved past trying to guess passwords. They don't need to. They're stealing the session tokens that get created after you've already authenticated. And once they have that token, your MFA is irrelevant. They're already inside.

How token theft actually works

Here's the short version. You log into your Microsoft 365 account. You enter your password, approve the MFA push on your phone, and you're in. Your browser now holds a session token -- a small piece of data that proves you've authenticated. That token is valid for hours, sometimes days.

An attacker doesn't need your password or your MFA code. They just need that token.

The most common method right now is adversary-in-the-middle (AiTM) phishing. The attacker sets up a proxy server between you and the real login page. You think you're logging into Microsoft. You're actually logging into a perfect copy that relays everything to Microsoft in real time. You enter your credentials. You approve MFA. Microsoft issues a session token. The attacker grabs it before it reaches your browser.

They now have a fully authenticated session. No alarms. No failed login attempts. Nothing suspicious in your logs except a login from an unexpected location -- if you're even watching for that.

Why healthcare is especially vulnerable

Healthcare organizations run on Microsoft 365. Epic, Cerner, and every other major EHR system integrates with Azure AD. Your clinicians access patient portals, scheduling systems, and email through the same identity platform. One stolen token can give an attacker access to all of it.

And healthcare workers are prime phishing targets. They're busy. They're stressed. They get hundreds of emails a day. When an email says "Your password expires in 24 hours, click here to update," they click. They don't have time to inspect URLs.

I worked with a 400-bed hospital last year where an attacker used an AiTM kit to steal a radiologist's session token. Within two hours, they'd accessed the radiologist's email, found VPN credentials in an old message, and pivoted into the internal network. The radiologist had MFA enabled. It didn't matter.

The tools are cheap and easy

This isn't sophisticated nation-state stuff. AiTM phishing kits like EvilGinx2 are open source. Anyone can download them. The phishing-as-a-service market sells ready-made kits with Microsoft 365 templates for a few hundred bucks a month. They come with dashboards, analytics, and customer support.

Let that sink in. The tools to bypass your MFA investment cost less than your monthly coffee budget.

Token theft through malware is even simpler. Infostealers like Raccoon and RedLine grab session cookies from browsers. They cost fifty dollars on Telegram. An attacker buys stolen cookies in bulk, filters for healthcare organizations, and starts accessing accounts within minutes.

What you should actually be doing

MFA is still necessary. Don't misread this. Turning off MFA would be catastrophic. But you need to stop treating it as the finish line.

First, move to phishing-resistant MFA. FIDO2 security keys and Windows Hello for Business don't use codes or push notifications that can be intercepted. They use cryptographic challenges bound to the legitimate site. An AiTM proxy can't steal what doesn't exist as a transferable token.

Second, implement conditional access policies that actually mean something. Require compliant devices. Block legacy authentication protocols. Flag logins from impossible travel scenarios. If someone logs in from Calgary at 9 AM and from Lagos at 9:15 AM, that's not a frequent flyer. That's a stolen token.

Third, monitor for token replay. Microsoft Entra ID Protection can detect when the same token is used from multiple IP addresses. Turn it on. Look at the alerts. Respond to them.

Fourth, shorten token lifetimes. A session token that's valid for 72 hours gives an attacker a three-day window. Cut that to eight hours or less. Yes, your users will have to re-authenticate more often. They'll survive.

Fifth, deploy endpoint detection that watches for infostealer activity. Browser cookie theft has specific behavioral patterns. Your EDR should be catching it. If it's not, you either don't have EDR or it's not configured properly.

The uncomfortable truth

The security industry sold healthcare a simple story: deploy MFA and you're safe. It was never true, but it was close enough for a while. That window is closed.

Attackers adapt faster than defenders. Always have. The organizations that get ahead of this are the ones that understand security isn't a checklist of tools you deploy. It's a continuous operation that evolves with the threat.

If your security strategy still treats MFA as the crown jewel of your defense, you're fighting the last war. The attackers have already moved on. Time for you to do the same.

GuardsArm helps healthcare organizations build security programs that go beyond checkbox compliance. From phishing-resistant MFA rollouts to 24/7 token abuse monitoring, we help you stay ahead of threats that haven't hit the news cycle yet. If you're wondering where your gaps are, we should talk.

Topics

#MFA
#Token Theft
#Phishing
#Healthcare Security
#Identity Security

Written by GuardsArm Team

Our team of cybersecurity experts brings decades of combined experience in penetration testing, compliance auditing, and incident response. We're dedicated to helping organizations strengthen their security posture.

Related Articles

The $4.5 Million Email: How Phishing Still Owns Healthcare
Emerging Threats

The $4.5 Million Email: How Phishing Still Owns Healthcare

Your IT Director Is Not a CISO (Stop Pretending)
Industry Specific

Your IT Director Is Not a CISO (Stop Pretending)

Why Healthcare Organizations Get Breached on Weekends
Threat Detection Response

Why Healthcare Organizations Get Breached on Weekends