Skip to content

Get Started

Cyber Defense Magazine Features Token on Real Time Phishing Relay Attacks

By Kevin Surace  |  1 minute read

Cyber Defense Magazine’s December issue includes a new article by Kevin Surace, Chair at Token, explaining why real time phishing relay attacks have become the most effective method for bypassing legacy MFA. These attacks are now driving many of the ransomware incidents and data breaches affecting organizations worldwide.

In the article, Kevin breaks down how attackers use live proxy sessions, fake login portals, and push prompt coercion to trick users into approving access. He explains why SMS codes, authenticator apps, and push notifications are vulnerable to these attacks because they rely on transferable factors that can be forwarded, relayed, or socially engineered in seconds.

Kevin also highlights the rising impact of these incidents, with more than 120 million records exposed in a single quarter, and shows why traditional MFA is no longer sufficient, even when used correctly.

The article outlines what actually stops these attacks: phishing proof biometric MFA that uses domain bound cryptographic authentication, device specific signatures, and instant biometric verification, making relay attacks and session hijacking impossible.

Read the full article on Cyber Defense Magazine >>>