How Easy It Is to Breach an Email Account with MFA?


Published: 11th July 2025



Despite the widespread adoption of Multi-Factor Authentication (MFA), many businesses remain vulnerable to sophisticated cyber attacks. In our recent webinar, we demonstrated just how easy it is to breach an email account, even with MFA enabled.

Evilginx in Action

During the webinar, we showcased a live demo using Evilginx, a tool that facilitates man-in-the-middle reverse proxy attacks. This demo illustrated how easily an attacker can steal a user’s Microsoft 365 credentials and session token, gaining full access to their email account. The process involved setting up Evilginx, configuring a plausible domain, and creating a phishing link that tricked the victim into providing their credentials.

Watch our latest webinar where one of our team shows exactly how easy it is for someone with basic IT knowledge to breach an unsuspected user’s email account.

Watch now → 

Key Insights from Our Latest Webinar

Recent statistics from the government’s cybersecurity breach survey highlight the alarming frequency of cyber attacks. Small and medium-sized businesses (SMBs) reported a 25% breach rate, while medium and large businesses experienced breach rates between 40% and 50%. Phishing attacks accounted for over 50% of financially impactful breaches, underscoring the need for robust cybersecurity measures.

Implications of a Breach

The consequences of a cyber breach extend beyond financial loss. Businesses may suffer reputational damage, data loss, and legal repercussions. For instance, losing customer data can lead to lawsuits and a significant loss of trust. Cyber insurance can help manage these risks, but prevention remains the best strategy.

Mitigation Strategies

To protect against breaches, businesses should implement comprehensive security measures, including:

  • Multi-Factor Authentication (MFA): While not foolproof, MFA adds an extra layer of security.
  • Conditional Access Policies: These policies restrict access based on user identity, device, and location.
  • Regular Security Audits: Conducting simulated phishing attacks and regular security assessments can help identify vulnerabilities.
  • Cyber Insurance: Ensuring your business is covered in the event of a breach can mitigate financial and reputational damage.

Strengthen Your Cybersecurity Posture

By understanding the latest breach statistics and implementing robust protective measures, your business can safeguard data and maintain trust with customers. Stay tuned for more insights and tips from Enhanced to help you navigate the complex world of cybersecurity.