WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Security Awareness – Phishing Method Exploits Remote Access to Circumvent MFA
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Security Awareness – Phishing Method Exploits Remote Access to Circumvent MFA

Author: Alec Davison

Created: Thursday, February 24, 2022 - 19:49

Categories: Cybersecurity

A new phishing technique is helping threat actors bypass multi-factor authentication (MFA) by tricking victims into logging into their accounts directly on adversary-controlled servers using the VNC screen sharing system. MFA protocols have become one of the best defenses against phishing compromises and other malicious cyber activity. However, a security researcher has come up with a novel approach to bypass MFA protocols using the “noVNC remote access software and browsers running in kiosk mode to display email login prompts running on the attacker’s server but shown in the victim’s browser,” according to BleepingComputer. Additionally, if the victim enters the MFA passcode on the attacker’s server, the threat actor would now have access to the account for future logins. Practicing basic cyber hygiene and treating all email as suspicious, especially when it prompts you to login to your account will help defend against this type of MFA-bypass attack. Read more at BleepingComputer.

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 7, 2026)

May 7, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness
Members Only

(TLP:GREEN) Gate 15 TARGET Report – Identity Centric Attacks: The Shift from Network to Identity as the Primary Attack Surface

May 7, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) CISA and Partners Release Guidance for Careful Adoption of Agentic AI Services

May 7, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar