B&R Computers - IT Services & Cybersecurity in Lehigh Valley

Managed IT Services in Allentown, Reading & Berks County

B&R Computers provides 24/7 system monitoring, expert IT support, patch management, server and workstation management, network optimization, backup and disaster recovery, and help desk support for businesses in Allentown, Reading, Wyomissing, Kutztown, and throughout Lehigh Valley and Berks County, Pennsylvania. Our managed IT services follow industry best practices recommended by NIST Cybersecurity Framework.

Cybersecurity Solutions for Lehigh Valley Businesses

Protect your business with 24/7 security and threat monitoring, advanced endpoint protection, security incident response, vulnerability assessments, and compliance management including HIPAA, FTC Safeguards Rule, and CMMC from B&R Computers. We also provide security awareness training to help your team recognize and prevent cyber threats, following guidelines from CISA.

AI Consulting & Workflow Automation

Transform your business with AI strategy and planning, workflow automation, and AI adoption training. B&R Computers helps businesses in Berks County and Lehigh Valley leverage artificial intelligence to increase efficiency and reduce costs.

About B&R Computers

B&R Computers has over 20 years of experience providing IT services and cybersecurity solutions to businesses in the Lehigh Valley and Berks County. We are locally owned and operated in Kutztown, PA. Connect with us on Facebook and LinkedIn. We follow cybersecurity best practices recommended by the U.S. Small Business Administration (SBA).

Why Choose B&R Computers

B&R Computers is your trusted partner for managed IT support, regulatory compliance, and business automation. We serve businesses of all sizes across the Lehigh Valley and Berks County with tailored technology solutions. View our sitemap for a complete overview of our services.

Contact B&R Computers

Call (484) 641-8083 or email [email protected]. Visit us at 7 S. Kemp Rd., Kutztown, PA 19530. Contact us today for a free consultation. Serving Allentown, Reading, Wyomissing, Kutztown, and all of Berks County and Lehigh Valley, Pennsylvania. Book a strategy call online.

Back to Blog
March 24, 2026Cybersecurity, AI

Beyond the Password: How AI-Powered Phishing is Bypassing Your MFA

Beyond the Password: How AI-Powered Phishing is Bypassing Your MFA

For years, the advice from every cybersecurity expert, myself included, has been pretty straightforward: "Enable MFA and you’ll be fine." We treated Multi-Factor Authentication like a digital suit of armor. If a hacker managed to guess your password, that secondary code on your phone would stop them cold.

But things have changed.

In the last few months, we’ve seen a massive shift in how cybercriminals operate. They aren't just trying to guess your password anymore. They’ve realized that the password is the hardest part to get, so they’re simply going around it. By using advanced AI and targeting the "session tokens" your browser uses to keep you logged in, attackers are walking right past MFA prompts like they aren't even there.

If you’re running a business today, you need to understand that the "MFA is enough" era is officially over. Here is how AI-powered phishing is changing the game and what you can do to protect your team at B&R Computers.

The Death of the "Obvious" Phish

We all remember the old phishing emails. They were riddled with typos, sent from "[email protected]," and usually promised you a million dollars if you just clicked a suspicious link. They were easy to spot.

AI has killed that version of phishing.

Today, attackers are using AI kits like "InboxPrime" to generate lures that are indistinguishable from legitimate business communications. These AI tools can mimic the tone, branding, and even the specific writing style of your vendors or colleagues.

Instead of a generic "Please sign this document," an AI-generated phish might say: "Hi Sarah, I noticed the quarterly update for the Railway project didn't include the updated infrastructure costs. Can you check the latest OAuth requirements on this secure portal?"

Because these emails are generated individually by AI, they don't have a "signature" that traditional spam filters can catch. Every single email is unique. To your email filter, it looks like a normal, one-on-one conversation.

Digital illustration comparing traditional phishing emails with sophisticated, polished AI-powered phishing attacks. Description: A split-screen comparison. On the left, a traditional phishing email with typos and bad formatting. On the right, a perfectly polished, AI-generated business email that looks 100% authentic.

The "Railway" Campaign: Exploiting Infrastructure

A particularly nasty campaign we’ve been tracking involves the use of Railway, a legitimate cloud infrastructure platform. Attackers are hosting their malicious landing pages on these trusted cloud services because they know that most security software won't block traffic coming from a "safe" domain like Railway.

By leveraging legitimate cloud power, hackers can scale their attacks instantly. They aren't just sending ten emails; they’re sending ten thousand, all hosted on high-reputation infrastructure that slips right past your firewall.

Forget the Password: They Want Your Token

This is the most critical part of the new threat landscape. In a traditional attack, the hacker wants your password. In a modern "Adversary-in-the-Middle" (AitM) attack, they don't care about your password. They want your Session Token.

When you log into Microsoft 365 or Google, you enter your password and your MFA code. Once you’re in, the website drops a "token" in your browser. This token tells the website, "This person has already proven who they are; don't ask them for a password again for a while."

These tokens are the "backstage passes" of the internet. They can stay valid for 30, 60, or even 90 days.

AI-powered phishing kits now use "Man-in-the-Browser" techniques. When you click a link in a phishing email, you’re sent to a fake login page that looks exactly like Microsoft’s. As you type your password and enter your MFA code, the attacker’s server passes that information to the real Microsoft site in real-time.

Microsoft thinks it’s you. It issues a session token. The attacker intercepts that token and "clones" it into their own browser.

Cybersecurity graphic showing a digital hand stealing a session token to bypass a locked multi-factor authentication pad. Description: A digital padlock that is locked, but a ghost-like hand made of binary code is pulling a glowing 'token' or 'keycard' out from behind it. This illustrates bypassing the lock without breaking it.

The result? The hacker is now logged into your account as you. They didn't "break" your MFA, they just stole the "Authorized" status that the MFA created. Because they have the token, they don't need to know your password, and they won't be asked for a second factor again.

Why This is the New Front Line for SMBs

For a small or medium-sized business, this is a nightmare scenario. If an attacker gets a hold of a 90-day session token for your Office 365 account, they have three months of uninterrupted access to your emails, your OneDrive files, and your contacts.

They can:

  1. Read your emails to understand how you talk to clients.
  2. Intercept invoices and change the wire transfer instructions (Business Email Compromise).
  3. Spread the infection by sending phishing emails from your real, authenticated account to your business partners.

Since the attacker is using a valid session token, your IT system won't flag any "failed login attempts." To the system, everything looks perfectly normal.

Moving Beyond Basic MFA

If MFA can be bypassed, does that mean it’s useless? Absolutely not. MFA still stops the vast majority of automated, low-level attacks. You should absolutely keep it enabled.

However, you need to layer your defenses. At B&R Computers, we recommend moving toward "Phishing-Resistant MFA."

1. FIDO2 and Hardware Keys

The gold standard is using hardware security keys (like YubiKeys). These use a protocol called FIDO2 that binds the login to the actual hardware and the specific URL of the site. If you’re on a fake phishing site, the hardware key simply won’t provide the token. It’s one of the few ways to truly stop AitM attacks.

2. Conditional Access Policies

You should limit the "lifespan" of those session tokens. While a 90-day token is convenient, it’s a massive risk. We help businesses set up policies that require re-authentication more frequently or only allow logins from "Compliant" devices that your company manages.

3. Monitoring and AI Consulting

If the bad guys are using AI to attack, you need to use AI to defend. Modern security tools can look for "impossible travel" (e.g., you logged in from New York, and 10 minutes later a session token is used in Eastern Europe) and automatically kill the session.

We’ve started working with more clients on AI Consulting to help them understand how these automated threats work and how to build a tech stack that can keep up with the speed of AI-driven crime.

Practical Steps for Your Team

Until you can get more advanced protections in place, there are a few things you can do today:

  • Watch for the "Session Timeout" scam: If you are suddenly asked to log into Microsoft or Google when you were already logged in five minutes ago, be extremely suspicious. Close the tab and navigate to the site manually.
  • Audit your OAuth permissions: Periodically check which third-party apps have access to your account tokens. If you don't recognize an app, revoke its access immediately.
  • Check the SMB Cyber Playbook: We’ve put together a comprehensive guide for business owners who want to stay ahead of these threats. You can find it here: SMB Cyber Playbook.

The Bottom Line

The "lock and key" metaphor for cybersecurity is dead. We are now in the era of "Identity Security." It’s no longer about keeping people out; it’s about constantly verifying that the person already inside is who they say they are.

AI-powered phishing is sophisticated, but it isn't invincible. It just requires a more proactive approach to your IT services and a realization that your security needs to evolve as fast as the hackers do.

If you’re worried that your current setup might be vulnerable to token theft or AI-driven phishing, let’s talk. We can run a gap analysis on your current identity management and see where the holes are before a hacker finds them for you.

Ready to harden your defenses? Book a BRC Cyber Strategy Session here or visit our Contact Page to get started.

Stay safe out there,

Ryan Hertzog President, B&R Computers

Tags:AIMFAPassword

Need Help with Your IT?

Our team of experts is ready to help secure and optimize your business technology.