Preventing Social Engineering and Helpdesk Abuse & AiTM
Conditional Access, especially in Microsoft centric AITM abuse, play a key part in the protection of identities. Several key controls can help to limit identity theft:
- Enforce MFA (modern authentication methods and not just email or SMS)
- Enforcing hybrid joined or compliant devices
- Enforcing phishing resistant MFA (using authentication strength controls, and mandating a certain authentication strength for users)
- Enforcing re-MFA on risky sign ins.
- Block countries/regions from which you never expect a sign-in
- Reduce exceptions on conditional access policies where possible
- CAE and Token Binding
Another proactive consideration is the blocking of known abused services, whilst this isn’t a conclusive list, JUMPSEC advises considering blocking the following hosting providers at identity provider level – to be clear, blocking these at the identity layer wont prevent users from visiting sites hosted on these providers, more so authentication attempts originating from them.
There is a degree of operational risk, as legitimate services could be affected. We therefore recommend hunting first to confirm whether these networks are used in your environment before enforcing a block. That said, in most cases users should not be authenticating from these addresses, making them high-value candidates for restriction.
Reviewing and testing the helpdesk credential reset process is also an important step in securing the identity security information.
- Never reset based only on username or employee ID.
- Require at least two independent verification factors (e.g., employee badge number + callback to a pre-registered phone + MFA code).
- Compare against HR system data that can’t be easily guessed or found online (e.g., manager name, last training completion date, internal extension).
- If the request comes by phone/email/chat, only call back using the official contact number stored in the corporate directory — not the one provided by the requester.
- Limit which accounts helpdesk can reset (e.g., no domain admin or executive resets without supervisor approval).
- Require supervisor approval (or two IT staff members) to reset credentials for high-risk roles (executives, IT admins, finance staff).
- Train helpdesk staff to recognize urgency pressure (“CEO needs this now”), intimidation, or oversharing attempts.
Detecting Social Engineering and Helpdesk Abuse & AiTM
Common mistakes with see with the proactive detection of AiTM unfractured is the reliance on detected front end infrastructure. It would be impossible to automatically include all of the domains that are staged immediately in a blocklist. The focus should be on the backend infrastructure, however with that being said, there are some quick wins that can be had, involving proactive blocking of commonly abused hosting providers (as provided above).
Custom detection logic that captures the following:
- Unfamiliar sign in properties – this is a great indicator that an account has been signed into with various properties that don’t match their standard operating practices.
- Impossible travel – Another great Microsoft standard detection will
- A new MFA method added (this can be enriched with a new IP address also being used)
- Email forwarding rule creation – this is a generic detection Microsoft offers that is in most cases overlooked but is a key indicator. This again can be enriched logins from new IP addresses.
AiTM continues to evolve in uneven ways. Some campaigns demonstrate increasingly advanced techniques, such as abuse of trusted platforms and dynamic, fingerprint-resistant kits. Others remain clumsy and poorly implemented, yet still succeed against organisations with gaps in their defences. This mix of sophistication and simplicity underscores why AiTM remains one of the most effective attack methods. Defenders must prepare for both ends of the spectrum.