Modern phishing attackers, using frameworks such as Evilginx2, Ex-Robotos, and Kr3pto, are defeating multi-factor authentication implementations. Defenders are stuck in a reactive mode, spending cycles resetting accounts, writing emails to lawyers hoping for takedowns, and praying for IT to update conditional access policies.
In this session, I will outline defensive techniques utilizing honey data and standard logging to detect and minimize the effects of these modern phishing attacks. These techniques will be shown in four phases and have applicability to large and small organizations. I will also detail the metrics for success that can be used to show degradation of phishing campaigns against not only your enterprise but to your clients, vendors, and potential consumers.