A password reset can make an IR team feel busy while the attacker stays logged in. In session token theft, the stolen artifact often outlives the password that created it.
That matters more in 2026 because access flows span the IdP, browser, endpoint, email, and dozens of SaaS apps. Your job is not only to spot suspicious sign-ins, but to evict the actor everywhere and prove the eviction worked.
Why session token theft breaks old IR habits
Attackers no longer need the password once they hold a valid session cookie, access token, refresh token, or device-bound trust state. As a result, phishing-resistant MFA helps at login, but it does not always stop replay of a token stolen after that login.
Public reporting in April 2026 showed the pattern clearly: a breach at a SaaS integration provider led to downstream abuse of customer environments. That kind of chain attack turns one stolen token into access across email, CRM, data platforms, and admin consoles. For a useful reference model, see Microsoft’s token theft playbook.
Resetting the password without killing sessions is cleanup, not containment.
This is why IR teams now need identity-centric detection and response. Modern controls such as sender-constrained tokens, Continuous Access Evaluation, and short token lifetimes help, but they are uneven across vendors. The practical limits are well explained in guidance on DPoP, CAEP, and continuous signals. Until those controls are broad and consistent, teams still need a disciplined playbook for session token theft.
First-hour detection and scoping
Start by treating the alert as an identity incident with endpoint and SaaS blast radius. Pull the user’s recent sign-in history, conditional access results, device identifiers, user agents, source IPs, ASN data, mailbox activity, admin events, and major SaaS audit trails. Preserve this fast, because some SaaS logs are shallow, delayed, or short-lived.

Common signals include repeated access from new geographies without a fresh MFA event, impossible travel tied to the same browser family, mailbox rule creation, OAuth consent changes, or SaaS exports that do not match the user’s past behavior. On the host side, check browser artifact theft, infostealer activity, session store access, and token theft from developer tools or sync agents. A vendor example of the response pattern is this cloud token theft response playbook.
Questions to answer before you contain
- Which artifact was likely stolen, a browser session, refresh token, access token, or device trust token?
- Did the activity come from one managed endpoint, or do you see signs of broader credential or malware compromise?
- Which SaaS apps accept the same IdP session, and which hold their own long-lived sessions?
- Are there OAuth grants, connected apps, service accounts, or delegated admin paths that can mint fresh tokens?
Those answers shape containment. They also stop a common mistake, revoking the user in the IdP while a separate SaaS session stays valid.
Containment, revocation, and attacker eviction
Containment works best when one lead coordinates the IdP team, EDR, email admin, and SaaS owners. If they act in sequence instead of together, the attacker often keeps one foothold.

Use this order for active response:
- Freeze risky actions first. Block suspicious IPs, pause high-value exports, and disable delegated admin paths while evidence is still fresh.
- Revoke every session path you can reach. Terminate IdP sessions, revoke refresh tokens, invalidate app sessions, and force re-auth in each major SaaS platform.
- Break device trust if needed. If the endpoint is suspect, isolate it, revoke device registration, and require a clean, compliant device before new access.
- Remove token minting paths. Revoke OAuth grants, review enterprise apps, kill unused API tokens, and rotate integration secrets.
- Reset credentials and factors last, not first. Password reset, factor reset, and session re-issue matter, but only after wider token eviction.
Conditional access policy changes help, but they are not a magic switch. Some apps honor revocation slowly. Others keep their own sessions. Therefore, password resets alone are often insufficient when active sessions, refresh tokens, device trust, or OAuth grants remain valid.
Sample containment checklist
- Force sign-out in the IdP and in each high-risk SaaS app.
- Revoke refresh tokens and persistent browser sessions.
- Remove malicious mailbox rules, delegates, and forwarding.
- Revoke recent OAuth consents and review app scopes.
- Isolate or reimage the endpoint that likely lost the token.
- Rotate exposed API keys, sync agent secrets, and admin tokens.
How to validate eviction and recover safely
Do not declare success when the user gets back in. Declare success when the attacker cannot.
Validation needs evidence across platforms. Watch for failed replays from the earlier attacker IP space, fresh sign-in prompts on the user’s devices, and the end of suspicious SaaS actions. Confirm that revoked OAuth grants stay revoked, no silent token re-issuance occurs, and old device IDs no longer satisfy policy. If the root cause was browser theft or infostealer malware, recover the endpoint before you restore normal access.
Recovery should also close the gaps the incident exposed. Tighten session lifetime where the business can tolerate it. Limit app scopes. Turn on richer audit logging where the vendor offers it. Map which SaaS apps depend on the IdP for session kill, and which require local action by the app owner. That map saves time during the next incident.
The lesson for 2026 IR teams
Session token theft is an identity incident, an endpoint incident, and a SaaS incident at the same time. Teams that treat it as a simple password problem leave working access behind.
The strongest playbook is the one that evicts the actor across every trust plane, then proves the eviction with logs, failed replays, and clean re-authentication paths. In 2026, that is the difference between response and theater.

