You have to invite them in

Summary: This article discusses the increasing trend of attackers persuading victims to grant access through social engineering techniques, such as multi-factor authentication (MFA) spray attacks and phishing. It also highlights the recent cyber attack on Stryker and advises organizations to increase vigilance and improve their defensive capabilities.

In our upcoming 2025 Talos Year in Review, attacks on identity emerged as the dominant theme across multiple vectors. Attackers are not so much trying to batter down doors with noisy exploits; increasingly, they’re looking to be invited in as a recognized user. And once inside, their goal is to operate as if they own the place.

Most organizations have boundaries—segmentation and authentication—but when consent is manipulated (e.g., through social engineering), the system can authorize the intrusion itself.

One of the most common techniques we see involves attackers persuading victims to read out their multi-factor authentication request code in real time, often over the phone, posing as IT support or a trusted vendor. In other cases, adversary-in-the-middle phishing kits proxy the legitimate login page and capture the one-time code as it’s entered.

The code is valid,
the authentication succeeds,
and the session is issued.

In 2025, nearly a third of MFA spray attacks targeted identity access management (IAM) applications. Add to that a 178% surge in fraudulent device registration events, and the trend is clear: attackers are targeting the mechanisms that issue invitations first.

Key facts

  • In 2025, nearly a third of MFA spray attacks targeted IAM applications.
  • 178% surge in fraudulent device registration events in 2025.

Why it matters

This trend highlights the growing sophistication of attackers who use social engineering techniques to gain unauthorized access. Such methods can bypass traditional security measures, making it crucial for organizations to improve their vigilance and defensive capabilities against such threats.