By Staff Writer at LMG Security   /   Mar 16th, 2026

The Next Enterprise Breach May Start With a Phone

ep63 raw cover image

For years, enterprise security teams focused on the perimeter. 

Then came endpoints.
Then the cloud.
Then identity became the new control plane. 

But there is a shift underway that many organizations still haven’t fully absorbed. 

One of the most powerful pieces of your identity infrastructure is no longer sitting in a data center or protected behind endpoint detection tools. 

It’s in someone’s pocket. 

Mobile phones have quietly become central to corporate authentication. They approve multi-factor authentication requests, store password managers, maintain active SaaS sessions, and frequently serve as recovery mechanisms for enterprise accounts. 

Every time someone taps “Approve” on an MFA notification, they’re unlocking access to corporate systems.

Which means the phone has quietly become part of the enterprise identity stack.

Attackers have noticed. 

“Attackers can get corporate identity access without ever touching the corporate network,” Sherri said.

That statement captures a fundamental shift in how breaches happen today. If attackers compromise the device that validates authentication requests, they often don’t need to exploit servers or bypass firewalls. 

They can simply log in as the user.

 

Mobile Devices Are Now the Identity Linchpin 

Enterprise identity systems increasingly depend on mobile devices. 

Phones are commonly used to access or store: 

  • MFA applications
  • password managers
  • corporate email
  • single sign-on authentication sessions
  • SaaS access tokens
  • account recovery mechanisms 

That makes them far more than convenience tools. They function as gatekeepers to enterprise access.

“The phone has really become an identity linchpin,” Matt said.

Yet many organizations still treat mobile devices as peripheral technology outside the formal security boundary. 

Security teams rigorously review cloud integrations, monitor endpoints, and deploy identity governance tools across corporate laptops. 

But the device used to approve authentication requests often receives far less oversight.

That disconnect creates a growing opportunity for attackers.

 

The Coruna Exploit Kit Shows How Serious Mobile Attacks Have Become 

Recent research from Google Threat Intelligence offers a glimpse into how sophisticated mobile exploitation has become. 

The Coruna iOS exploit toolkit chained together 23 vulnerabilities across multiple iOS versions and was observed in real-world watering-hole attacks.

Once deployed, the exploit provided root access to the device.

From there, attackers could access:

  • SMS messages
    • microphones and device sensors
    • password managers
    • MFA applications
    • corporate email
    • active SaaS session tokens 

In other words, they could obtain everything needed to impersonate the user across enterprise systems. 

Google’s full research is available in their report on the Coruna exploit toolkit. 

The impact goes far beyond personal privacy. A compromised phone can expose corporate authentication tokens and session credentials. With those tokens, attackers may be able to move across cloud platforms without triggering traditional network monitoring controls.

This pattern isn’t entirely new. Nearly a decade ago, the Pegasus spyware campaigns demonstrated how powerful mobile exploitation could be. Researchers at Citizen Lab documented how Pegasus could fully compromise phones and enable surveillance and identity takeover in their Pegasus investigation series. 

What has changed is the economics of attack.

Capabilities once reserved for nation-state intelligence agencies are increasingly accessible to financially motivated threat actors. 

Mobile exploitation is no longer rare. 

It’s becoming profitable. 

 

The Everyday Mobile Risk Most Organizations Ignore 

While advanced exploit kits grab headlines, the more common mobile risk is much simpler. 

Outdated devices. 

According to the Zimperium Global Mobile Threat Report, more than 61 percent of Android devices and nearly half of iOS devices are running outdated operating systems.

You can explore the data in Zimperium’s Global Mobile Threat Report. 

That means millions of devices actively used for authentication may be exposed to known vulnerabilities. 

At the same time, vulnerabilities in mobile applications can create additional exposure. Security researchers at Oversecured identified serious flaws in widely used mental health applications totaling more than 147 million downloads, detailed in their research at Oversecured. 

These apps often request extensive permissions and operate alongside enterprise authentication tools on the same device. 

In practice, most phones now contain a mixture of: 

  • personal applications
    • sensitive personal data
    • corporate authentication credentials 

All on the same device. 

That convergence creates risk. 

And many organizations still treat mobile devices as if they sit outside the enterprise security boundary.

 

The BYOD Blind Spot 

Bring Your Own Device policies are now deeply embedded in corporate culture. 

They reduce hardware costs and provide employees with flexibility. 

But they also introduce structural risk when personal devices are used to authenticate into enterprise systems. 

If executives or administrators approve MFA prompts from personal phones, the organization effectively inherits the security posture of those devices. 

That includes factors like: 

  • operating system patch levels
  • installed applications and permissions
  • configuration settings
  • potential exposure to exploit chains 

Some devices cannot upgrade to newer operating system versions due to hardware limitations. When those devices are used for authentication, they may carry permanent exposure to known vulnerabilities.

When that phone protects privileged access, the risk extends directly into the enterprise environment. 

This does not necessarily mean BYOD must disappear entirely. But organizations should think carefully about which roles and privileges are appropriate for unmanaged devices. 

High-privilege access often demands stricter controls. 

 

Security Programs Need to Catch Up 

Recognizing the problem is the first step.  

Adapting security programs to reflect the new reality is the next. 

If a device is approving authentication requests, it should be treated as identity infrastructure.

That means integrating mobile devices into identity governance strategies. 

Organizations should consider measures such as: 

  • verifying operating system currency
  • enforcing device integrity checks
  • applying conditional access controls
  • restricting authentication from high-risk devices 

Security teams should also establish policies for high-risk mobile applications, including categories such as remote access tools, sideloading utilities, file sharing platforms, and proxy services. 

Application risk changes over time. Permissions evolve and vulnerabilities emerge. Periodic reviews of mobile device posture—especially for privileged users—can significantly reduce exposure. 

Another critical strategy is data minimization.

The more sensitive data stored on mobile devices, the greater the blast radius of compromise. At LMG Security, we often encourage organizations to treat sensitive data like hazardous material. The more widely it is distributed, the harder it becomes to control. 

Our blog on treating data like hazardous material explores this concept in more detail. 

Mobile devices must also be incorporated into incident response planning. A compromised phone can maintain active SaaS sessions even after a workstation has been wiped or reimaged. 

Incident response procedures should include: 

  • revoking active authentication sessions
  • resetting identity tokens
  • re-enrolling MFA devices
  • evaluating mobile device integrity 

The Perimeter Has Moved 

Enterprise security used to revolve around the firewall. 

Today, it revolves around identity. 

And increasingly, the device validating that identity is a phone.

Attackers have already adjusted to this reality. Compromising the device that approves authentication requests is often easier than breaching the network directly. 

Security leaders who treat mobile devices as an afterthought are operating with a blind spot. 

Those who integrate mobile risk into identity governance, privileged access management, and incident response planning can significantly reduce their exposure. 

Because the keys to your environment may no longer be in the server room. 

They may be in someone’s pocket. 

If your organization hasn’t formally evaluated its mobile identity exposure yet, now is the time. A structured assessment or incident response tabletop exercise can reveal gaps before an adversary does. 

And in today’s threat landscape, finding those gaps first makes all the difference. 

About the Author

LMG Security Staff Writer

CONTACT US