Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ ZENODOarrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
ZENODO
Preprint
Data sources: ZENODO
addClaim

The Harvard University Data Breach: Identity-Centric Threats and the Failure of MFA in Modern Cybersecurity

Authors: BHARTI, RAJ;

The Harvard University Data Breach: Identity-Centric Threats and the Failure of MFA in Modern Cybersecurity

Abstract

This paper presents a detailed analysis of the Harvard University data breach (2025–2026), focusing on identity-centric attack vectors such as vishing, adversary-in-the-middle (AiTM), and MFA bypass techniques. We introduce the Identity Exploitation Model (IEM), a structured four-layer framework for analyzing identity-based cyberattacks across human, authentication, interception, and privilege layers. The attack is further analyzed using MITRE ATT&CK and STRIDE frameworks, highlighting systemic vulnerabilities in modern authentication systems. The findings emphasize the limitations of traditional multi-factor authentication (MFA) and the need for phishing-resistant mechanisms such as FIDO2 and Zero Trust architectures.

Powered by OpenAIRE graph
Found an issue? Give us feedback