They can intercept user credentials while providing real-time context that helps attackers convince victims to approve MFA ...