TL;DR

Attackers in 2025–2026 didn't break in — they logged in. OAuth token theft, SSO trust-chain abuse, and MFA fatigue attacks let criminals waltz through identity-layer defences like they owned the place. For Australian SMBs running Microsoft 365, Google Workspace, or any SSO-linked stack: three low-cost controls — help-desk verification protocols, number matching, and session token hardening — can stop most of what made headlines.​‌‌​‌​​‌‍​‌‌​​‌​​‍​‌‌​​‌​‌‍​‌‌​‌‌‌​‍​‌‌‌​‌​​‍​‌‌​‌​​‌‍​‌‌‌​‌​​‍​‌‌‌‌​​‌‍​​‌​‌‌​‌‍​‌‌​​​‌​‍​‌‌‌​​‌​‍​‌‌​​‌​‌‍​‌‌​​​​‌‍​‌‌​​​‌‌‍​‌‌​‌​​​‍​​‌​‌‌​‌‍​‌‌‌​​‌​‍​‌‌​​‌​‌‍​‌‌​​​‌‌‍​‌‌​​​​‌‍​‌‌‌​​​​‍​​‌​‌‌​‌‍​‌‌​‌‌​‌‍​‌‌​​‌‌​‍​‌‌​​​​‌‍​​‌​‌‌​‌‍​‌‌​​​‌​‍​‌‌‌‌​​‌‍​‌‌‌​​​​‍​‌‌​​​​‌‍​‌‌‌​​‌‌‍​‌‌‌​​‌‌‍​​‌​‌‌​‌‍​‌‌​‌‌‌‌‍​‌‌​​​​‌‍​‌‌‌​‌​‌‍​‌‌‌​‌​​‍​‌‌​‌​​​‍​​‌​‌‌​‌‍​‌‌‌​​‌‌‍​‌‌‌​​‌‌‍​‌‌​‌‌‌‌‍​​‌​‌‌​‌‍​​‌‌​​‌​‍​​‌‌​​​​‍​​‌‌​​‌​‍​​‌‌​‌‌​


Identity is the new perimeter — and the perimeter is leaking. For years, Australian SMBs were sold MFA as the silver bullet. "Just turn it on," vendors said. "Blocks 99.9% of account compromises." The 2025–2026 breach record tells a different story. Targeted attackers treated MFA as a speed bump, not a wall. They bypassed it via social engineering, token theft, and outright trust-chain compromise — and in most cases, the victim's identity provider logs showed nothing wrong. The authentication looked legitimate. Because it was.

Here are three incidents that rewrote the playbook, followed by three defences you can deploy this week.​‌‌​‌​​‌‍​‌‌​​‌​​‍​‌‌​​‌​‌‍​‌‌​‌‌‌​‍​‌‌‌​‌​​‍​‌‌​‌​​‌‍​‌‌‌​‌​​‍​‌‌‌‌​​‌‍​​‌​‌‌​‌‍​‌‌​​​‌​‍​‌‌‌​​‌​‍​‌‌​​‌​‌‍​‌‌​​​​‌‍​‌‌​​​‌‌‍​‌‌​‌​​​‍​​‌​‌‌​‌‍​‌‌‌​​‌​‍​‌‌​​‌​‌‍​‌‌​​​‌‌‍​‌‌​​​​‌‍​‌‌‌​​​​‍​​‌​‌‌​‌‍​‌‌​‌‌​‌‍​‌‌​​‌‌​‍​‌‌​​​​‌‍​​‌​‌‌​‌‍​‌‌​​​‌​‍​‌‌‌‌​​‌‍​‌‌‌​​​​‍​‌‌​​​​‌‍​‌‌‌​​‌‌‍​‌‌‌​​‌‌‍​​‌​‌‌​‌‍​‌‌​‌‌‌‌‍​‌‌​​​​‌‍​‌‌‌​‌​‌‍​‌‌‌​‌​​‍​‌‌​‌​​​‍​​‌​‌‌​‌‍​‌‌‌​​‌‌‍​‌‌‌​​‌‌‍​‌‌​‌‌‌‌‍​​‌​‌‌​‌‍​​‌‌​​‌​‍​​‌‌​​​​‍​​‌‌​​‌​‍​​‌‌​‌‌​

Storm-0558: The Microsoft Signing Key That Wasn't Yours

In mid-2025, the fallout from Storm-0558 continued to unfold. The attack, originally detected in 2023, involved a threat actor compromising a Microsoft account signing key — a cryptographic secret used to forge Azure AD access tokens. With that key, the attacker didn't need MFA codes, passwords, or push approvals. They minted their own tokens. Outlook Web Access and Exchange Online were wide open.

The trust-chain failure was structural. Organisations federating identity to Microsoft via SSO implicitly trusted tokens signed by Microsoft's consumer signing system. The attacker acquired one key, and suddenly every token they issued was indistinguishable from a legitimate authenticated session. Azu

re AD logs showed valid sign-ins.

For SMBs: If your M365 tenant logs show a successful SSO sign-in from an unrecognised location or device, treat it as hostile regardless of what Entra ID says about MFA satisfaction.

Scattered Spider: The Help Desk Was the Front Door

The MGM Resorts and Caesars Entertainment breaches, attributed to the Scattered Spider / UNC3944 group, demonstrated something SMB owners intuitively understand: your help desk is the weakest identity gate. Attackers obtained employee names and phone numbers from LinkedIn, called internal IT help desks, and — armed with nothing more than an employee ID and a plausible story — convinced support staff to reset MFA registrations, enrol new authenticators, or disable MFA entirely.

No zero-day. No malware. Just a phone call. Total time from first ring to domain compromise: under an hour in MGM's case. The group's hallmark technique — SIM swapping followed by help-desk social engineering — remains the highest-success-rate identity attack vector in 2026. If someone can impersonate an employee to your IT support, your MFA is irrelevant.

EvilProxy and the Device Code Renaissance: Tokens, Not Passwords

By late 2025, the phishing economy had completed its pivot. Traditional credential-harvesting pages were out. Adversary-in-the-middle (AitM) proxies — EvilProxy, Tycoon, and Evilginx derivatives — were in. These tools sit between the victim and the real identity provider, proxying the entire authentication flow in real time. The victim sees the legitimate Microsoft or Google login page, completes their MFA push, and gets a normal-looking session. The attacker receives the authenticated session cookie — already post-MFA — and replays it.

Microsoft's April 2026 advisory on the EvilTokens phishing-as-a-service campaign added a new twist: device code phishing. Attackers initiate a legitimate OAuth device code flow (designed for smart TVs and printers), email the victim a short code with a "verify your account" pretext, and capture the authenticated token when the victim enters it. The flow decouples authentication from the originating session entirely — MFA is satisfied on the victim's device, but the token lands with the attacker. No credentials are exposed. No suspicious sign-in location. Just a valid token.

In one documented campaign, AI-generated lures tailored to the victim's role — RFPs, invoices, manufacturing workflows — drove click rates well above traditional phishing baselines. The backend infrastructure used Vercel, Cloudflare Workers, and AWS Lambda to rotate redirect domains at scale, blending phishing traffic into legitimate enterprise cloud patterns.

Three Defences That Survive 2026's Playbook

1. Help-Desk Verification Protocol (mandatory, not optional)

No MFA reset, no authenticator enrolment, no account recovery proceeds without out-of-band verification. That means: call the employee back on a number already on file — not one provided during the support call. Use a codeword established during onboarding. Require supervisor approval for any MFA modification. Document every MFA change request and audit the log weekly.

The ACSC Essential Eight explicitly calls for multi-factor authentication and privileged access management. Add a help-desk verification gate or none of the rest matters.

2. Number Matching and Phishing-Resistant MFA

Push notification bombing works because users reflexively tap "approve." Number matching — where the user must enter a two-digit code displayed on the sign-in screen into their authenticator app — eliminates reflexive approval. Microsoft Authenticator, Duo, and Okta all support it. Turn it on.

Where budgets permit, deploy FIDO2 hardware keys or passkeys. They're cryptographically bound to the relying party domain — a token captured on a phishing page can't be replayed against the legitimate service. FIDO2 isn't free from downgrade attacks (if fallback to SMS or push is permitted, attackers will force it), but it raises the cost of compromise dramatically.

3. Session Token Hardening and Admin Activity Alerting

Most post-MFA attacks succeed because session tokens are valid and long-lived. Reduce token lifetimes aggressively — Microsoft Entra ID Conditional Access supports sign-in frequency controls and token binding to compliant devices. Configure continuous access evaluation (CAE) so that revoked accounts can't retain active sessions.

Separately: alert on any global admin account activity. Admin role assignment changes, new application registrations, and mailbox rule creation are all post-compromise indicators. If you don't have a SIEM, start with Microsoft Sentinel's free-tier ingestion or enable mailbox audit logging and forward the logs somewhere you'll actually look at them.

FAQ

Q: We already use MFA via SMS. Is that enough?

No. SMS-based MFA is NIST-deprecated because SIM swapping bypasses it entirely. If SMS is your only second factor, migrate to an authenticator app with number matching, or deploy FIDO2 security keys for administrative accounts.

Q: How do I know if someone has already bypassed our MFA?

Look for: new multifactor authentication methods registered on accounts you don't recognise; inbox rules forwarding mail externally; unusual Entra ID application consent grants; and sign-in events showing "MFA satisfied" but originating from unfamiliar IPs or device types. Enable unified audit logging in M365 now — it's off by default on many tenants.

Q: We're a 15-person shop. Are we really a target?

Yes. SMBs are soft targets with the same cloud stack as enterprises. Phishing kits are sold as-a-service. Help-desk social engineering scales down perfectly — fewer employees means easier pretexting. Attackers value the speed, not the revenue.

Q: What's the cheapest thing we can do tomorrow?

Call your IT support provider. Tell them: no MFA changes or account recovery requests proceed without a verified callback to a known number. Write it into your support agreement. Cost: zero dollars. Impact: shuts down the Scattered Spider playbook against your organisation.

Conclusion

MFA is not dead — but it's been demoted from silver bullet to speed bump. The 2025–2026 breach cycle proves that identity-layer controls must be layered: strong MFA (phishing-resistant, not just present), ironclad help-desk verification, aggressive session token management, and admin activity alerting that someone actually reads.

Australian SMBs can't afford a dedicated identity security team. You can afford three policy changes this week: enable number matching, document a help-desk verification protocol, and reduce admin session lifetimes.

Your identity provider logs will show legitimate authentications because — in every breach scenario above — the authentication was legitimate. The trust was misplaced.

Visit consult.lil.business for a free cybersecurity assessment tailored to your SMB's identity stack.

References

  1. ACSC Essential Eight Maturity Model
  2. Microsoft Security Blog — AI-Enabled Device Code Phishing Campaign, April 2026
  3. NIST SP 800-63B — Digital Identity Guidelines: Authentication and Lifecycle Management
  4. CISA Advisory AA23-158A — Scattered Spider Ransomware and Extortion
  5. Obsidian Security — Token-Based Attacks: How Attackers Bypass MFA

TL;DR

  • A website called CarGurus had 12.4 million customer records stolen and published online
  • This happened because hackers found a way to break into their computer systems
  • It teaches us that when we share information with companies, we're trusting them to keep it safe
  • Businesses need to be careful about which companies they share customer data with

What Is a Data Breach?

Imagine you write a secret note and give it to a friend to keep safe. You trust your friend to hide it where nobody else can find it.

A data breach is like someone breaking into your friend's house and finding that secret note. Now your secret isn't secret anymore.

When businesses use computers to store customer information — things like names, addresses, phone numbers, and email addresses — they have to keep it safe from hackers. A data breach happens when hackers break in and steal that information.

What Happened at CarGurus?

CarGurus is a website where people go to buy and sell cars. It's like a big online car marketplace where millions of people search for vehicles, compare prices, and apply for loans.

In February 2026, a group of hackers called ShinyHunters broke into CarGurus' computer systems and stole information about 12.4 million customers [1]. That's more people than live in entire countries like Switzerland or Austria!

The stolen information included:

  • Names
  • Email addresses
  • Phone numbers
  • Home addresses
  • Some financing information [2]

Then the hackers did something scary: they published all this information online, where anyone could see it.

Why This Matters for Your Business

If you run a business, you probably share customer information with other companies. Here are some examples:

  • Payment processors like Stripe or PayPal handle credit card information
  • Email marketing tools like Mailchimp store customer email addresses
  • CRM software like Salesforce keeps customer contact details
  • Industry platforms might share customer data with partners

When you share information with these companies, you're trusting them to keep it safe. If one of them gets hacked — like CarGurus did — your customers' information could be exposed too.

Think of it like lending your favorite book to a friend. If your friend leaves it on the bus and someone steals it, that's not your fault — but you've still lost your book.

The "Key Under the Mat" Problem

Imagine you hide a spare key to your house under the doormat in case you lock yourself out. It's convenient, but it also means anyone who finds that key can get inside.

Many businesses share customer information with lots of different companies because it's convenient. Each company is like another key under the mat. The more keys you have, the more chances someone has to find one and break in.

Here's why this is risky:

You can't control someone else's security. You might have excellent locks on your doors, but if you give a key to someone who leaves theirs under a flowerpot, your house still isn't secure.

You might not know when something goes wrong. If a company you work with gets hacked, you might not find out until weeks or months later.

Your customers trust you, not your vendors. When customers give you their information, they're trusting YOU to keep it safe — even if you end up sharing it with other companies.

How to Protect Your Customers

You can't eliminate all risk — doing business online means sharing information sometimes. But you CAN be smart about which companies you trust with customer data.

Choose Partners Carefully

Before sharing customer information with any company, ask yourself:

  • Do they really need this information to do their job?
  • What happens to the information when they're done with it?
  • Have they had security problems before?
  • Do they have security certifications (like SOC 2 or ISO 27001)?

Share Only What's Necessary

If a newsletter service only needs email addresses, don't give them phone numbers too. If a payment processor only needs billing addresses, don't give them customer birthdays.

Think of it like this: if you're hiring a dog walker, you give them a key to your house — but not the code to your safe. They only need access to what they're actually helping with.

Make a Plan Before Something Happens

Waiting until after a breach happens to figure out what to do is like waiting until your house catches fire to buy a smoke detector.

Have a plan ready:

  • Which customers do we need to notify?
  • What do we tell them?
  • How do we help them protect themselves?
  • Who is responsible for what?

What Your Customers Can Do

If your customers' data was exposed in a breach (like the CarGurus one), here's what they should do:

  1. Change their passwords — especially if they used the same password on multiple websites
  2. Enable two-factor authentication — this adds an extra layer of security, like requiring both a password and a code sent to their phone
  3. Watch for suspicious messages — hackers might use stolen information to send fake emails or texts pretending to be from real companies
  4. Check their credit reports — if financial information was stolen, they should look for any accounts or loans they didn't open

The Big Lesson

The CarGurus breach teaches us something important: when you share information with another company, their security becomes YOUR security problem.

You wouldn't hand your wallet to someone you don't know and walk away. So be careful about which companies you hand your customers' information to — and what information you share.

Because when something goes wrong, your customers will look to YOU, not the company you trusted.

FAQ

A data breach is when hackers break into a company's computer systems and steal information. It's like a burglar breaking into a house and stealing valuable items.

Hackers can use stolen information to pretend to be other people, access their accounts, or trick them into giving away more information (like passwords or bank details). They can also sell the information to other criminals.

Look for security certifications like SOC 2 or ISO 27001, ask about their security practices, and check if they've had breaches before. Companies that take security seriously will be happy to talk about it.

Change your passwords, enable two-factor authentication, watch for suspicious messages, and consider freezing your credit reports if financial information was exposed.

Not really — most businesses need to use some third-party services to operate. The goal is to choose carefully and share only what's necessary, not to eliminate all third parties.

References

[1] eSecurity Planet, "12.4 Million Accounts Exposed in CarGurus Leak," eSecurity Planet, March 2026. [Online]. Available: https://www.esecurityplanet.com/threats/12-4-million-accounts-exposed-in-cargurus-leak/

[2] Have I Been Pwned, "CarGurus Data Breach," Have I Been Pwned, 2026. [Online]. Available: https://haveibeenpwned.com/Breach/CarGurus

[3] BleepingComputer, "CarGurus Data Breach Exposes Information of 12.4 Million Accounts," BleepingComputer, March 2026. [Online]. Available: https://www.bleepingcomputer.com/news/security/cargurus-data-breach-exposes-information-of-124-million-accounts/


Choosing the right partners is part of protecting your customers. Book a consultation at consult.lil.business to build a security strategy that covers your entire business ecosystem.

Ready to strengthen your security?

Talk to lilMONSTER. We assess your risks, build the tools, and stay with you after the engagement ends. No clipboard-and-leave consulting.

Get a Free Consultation