Phishing-resistant MFA on every privileged account
Hardware keys or platform authenticators on admin, cloud-root, HR-system, CRM and customer-data accounts. SMS one-time codes do not count as MFA against a serious adversary.
- Quadrant
- Quick win
- Ease
- 4 / 5
- Impact
- 5 / 5
- Control family
- Identity
- Cost band
- low
- Catalogued incidents
- 9
What the control is
Every account with privilege — and the definition of privilege has to be wider than the IT org’s instinct — authenticates with a phishing-resistant factor. That means a hardware security key (YubiKey, Feitian, Google Titan, Apple Secure Enclave) or a platform authenticator backed by WebAuthn (Windows Hello, Touch ID, Android biometric). Not SMS one-time codes. Not authenticator-app codes that the user can be talked into reading aloud. Not push notifications that a tired admin will eventually accept.
“Privileged” in the way regulators use the word is wider than “IT admin.” NCSC, NIST and CIS all extend privilege to any account that can read a population of customer or employee records, change identity-system configuration, deploy code, or move money. In practice that pulls in HR-system admins, CRM admins, payroll administrators, financial-controller accounts, cloud-tenant root, code-repo owners, and anyone whose support role lets them export data on a customer’s behalf. The Salesforce contact-centre operator at the centre of the Qantas breach was a privileged account by this definition, even though the airline’s IT org would not have called them one.
Why it matters
The single most common entry technique in the catalogue is credential theft followed by a single-factor or weak-factor logon. Phishing-resistant MFA breaks the chain at that step regardless of how the credential was stolen. It doesn’t matter whether the password came from an infostealer log on a personal laptop, a successful spear-phishing landing page, a vishing call to a helpdesk, an MFA-fatigue prompt, or an OAuth-token theft. The hardware-bound private key never leaves the authenticator, can’t be phished, can’t be relayed through an attacker-in-the-middle proxy, and can’t be socially engineered out of a tired user.
The catalogue makes the case unusually concrete. Wynn Resorts (employee credential into PeopleSoft, 800,000 records). Pitney Bowes (phishing-stolen email account into Salesforce, 8.2 million records dumped). Carnival’s Mariner Society programme (single phishing-compromised user, 7.5 million emails). The MGM and Caesars ransomware events of September 2023 (vishing of helpdesks for password resets). The 2024 Snowflake-customer wave (infostealer credentials harvested from contractor home machines, then walked into customer Snowflake tenants without MFA). Uber’s 2022 breach (Lapsus$ pushed an MFA prompt repeatedly until the contractor accepted it). LastPass (a DevOps engineer’s home device, then onward into the vault backup). Each of those chains has one step in common where a phishing-resistant factor would have stopped the attacker cold.
Where the regulators sit
NCSC’s published position is that passkeys and hardware keys should be the default, not an option, with SMS as an explicitly deprecated fallback. NIST SP 800-63B classifies MFA into Authenticator Assurance Levels and reserves AAL3 — the level required for federal high-value access — for cryptographic hardware authenticators or software authenticators that cannot be cloned. CISA published a 2022 fact sheet titled “Implementing Phishing-Resistant MFA” in plain language for federal agencies and has repeated the recommendation in every joint cybersecurity advisory since. CIS Controls v8 makes phishing-resistant MFA an explicit requirement under Control 6 for any account that can administer systems or access sensitive data. The Australian Essential Eight gives phishing-resistant MFA its own maturity-level escalation: SMS at level 1, app codes at level 2, hardware keys or platform authenticators at level 3.
There is no serious disagreement across the major frameworks. The argument has been won.
Where it usually breaks
Three places. First, scope creep on what counts as “privileged” — IT defines it narrowly, the attacker defines it broadly, and the gap between those two definitions is where most breaches start. The fix is to push the privilege definition up to the data-classification scheme: any account that can bulk-read a customer-data object is privileged, period. Second, helpdesk recovery flows. Hardware-key MFA is only as strong as the process that re-issues a key when an admin loses theirs. The MGM and Caesars events both pivoted on vishing the helpdesk during recovery, not on the front-door logon. The fix is a hardware-attested recovery path — government-ID verification, in-person hand-off, or a known supervisor’s countersignature — not a phone call. Third, contractor populations. Internal full-time staff get hardware keys; contractors at outsourced support providers often don’t, because the hardware-key budget lives with the contracting firm. Wynn, Qantas, Coinbase 2024 and the broader Salesforce contact-centre cluster all pivot on this gap. The fix is a contractual requirement that contractor populations with privileged access are issued and enforced on the same authentication standard as employees, paid for by the customer if necessary. £40 a key is cheaper than every breach in this list.
What good looks like
Every cloud-tenant root account uses a hardware key with a paper-based recovery code stored in a sealed envelope in a physical safe. Every Active Directory domain-admin account uses a hardware key bound to a privileged-access workstation. Every HR-system, CRM and finance-system administrator uses a hardware key, with a recovery flow that requires in-person re-attestation. Every bulk-export query on customer-record systems is gated behind a separate re-authentication step using the same factor. The cost is the hardware. The lift is the policy work to define “privileged” wide enough to catch the contact-centre operator, the contractor sysadmin, and the data engineer who wrote a Salesforce query that returns 5.7 million rows.
The regulators agree. The catalogue is the receipts.
Where this control would have changed the outcome
- Wynn Resorts — ShinyHunters Oracle PeopleSoft breach ShinyHunters exploited an unpatched Oracle PeopleSoft flaw at Wynn Resorts in 2025, exfiltrating 800,000 employee records and demanding $1.5M — confirmed months later when the listing went public.
- Pitney Bowes — Salesforce CRM phishing breach, ShinyHunters dump ShinyHunters publicly dumped 8.2 million Pitney Bowes customer records harvested from a Salesforce CRM compromised via a phishing-stolen employee email account.
- Carnival Corporation — Holland America Mariner Society phishing breach ShinyHunters publicly dumped 7.5 million unique Mariner Society loyalty-programme email addresses after Carnival refused extortion following a single-user phishing compromise.
- MGM Resorts — Scattered Spider ransomware A LinkedIn search and a helpdesk phone call gave Scattered Spider domain-admin access to MGM Resorts; ransomware halted casino operations for ten days and cost over $100M.
- Caesars Entertainment — Scattered Spider extortion Scattered Spider socially engineered an IT support contractor, exfiltrated the Caesars Rewards loyalty database, and reportedly received a $15M ransom payment to prevent data publication.
- Coinbase — overseas-contractor breach Attackers bribed overseas Coinbase customer-support contractors to extract internal data on a subset of customers; Coinbase refused a $20M ransom and offered a counter-bounty.
- Uber — 2016 cover-up + 2022 social-engineering breach Uber concealed a 2016 breach of 57M records by paying the attacker as a bug bounty; a 2022 Lapsus$ intrusion exposed internal systems and executive Slack messages.
- Snowflake-customer mass credential-stuffing Infostealer-harvested credentials with no MFA gave attackers access to roughly 165 Snowflake customer environments including Ticketmaster and Santander, exposing hundreds of millions of records.
- LastPass — encrypted vault exfiltration Attackers compromised a LastPass DevOps engineer's home computer to harvest credentials to the vault backup, then exfiltrated customer vault data including encrypted passwords.
Sources
- NCSC — Multi-factor authentication for online services // primary
- NIST SP 800-63B — Digital Identity Guidelines, Authentication and Lifecycle Management // primary
- CISA — Implementing phishing-resistant MFA (2022) // primary
- CIS Controls v8 — Control 6: Access Control Management // primary
- ACSC Essential Eight — Multi-factor authentication // primary