MFA

Prezzo MFA Financial Inc

Closed
MFA
$10,08
+$0,04(+0,39%)

*Data last updated: 2026-04-15 05:35 (UTC+8)

As of 2026-04-15 05:35, MFA Financial Inc (MFA) is priced at $10,08, with a total market cap of $1,03B, a P/E ratio of 5,46, and a dividend yield of 14,28%. Today, the stock price fluctuated between $10,02 and $10,11. The current price is 0,59% above the day's low and 0,29% below the day's high, with a trading volume of 1,17M. Over the past 52 weeks, MFA has traded between $9,41 to $10,11, and the current price is -0,29% away from the 52-week high.

MFA Key Stats

Yesterday's Close$10,04
Market Cap$1,03B
Volume1,17M
P/E Ratio5,46
Dividend Yield (TTM)14,28%
Dividend Amount$0,36
Diluted EPS (TTM)1,70
Net Income (FY)$176,78M
Revenue (FY)$875,23M
Earnings Date2026-05-06
EPS Estimate0,31
Revenue Estimate$68,57M
Shares Outstanding102,60M
Beta (1Y)1.616
Ex-Dividend Date2026-03-31
Dividend Payment Date2026-04-30

About MFA

MFA Financial, Inc., together with its subsidiaries, operates as a real estate investment trust (REIT) in the United States. The company invests in residential mortgage assets, including non-agency mortgage-backed securities (MBS), agency MBS, and credit risk transfer securities; residential whole loans, including purchased performing loans, purchased credit deteriorated, and non-performing loans; and mortgage servicing rights related assets. The company has elected to be taxed as a REIT and would not be subject to federal income taxes if it distributes at least 90% of its taxable income to its stockholders. MFA Financial, Inc. was incorporated in 1997 and is headquartered in New York, New York.
SectorReal Estate
IndustryREIT - Mortgage
CEOCraig L. Knutson
HeadquartersNew York City,NY,US
Employees (FY)307,00
Average Revenue (1Y)$2,85M
Net Income per Employee$575,84K

MFA Financial Inc (MFA) FAQ

What's the stock price of MFA Financial Inc (MFA) today?

x
MFA Financial Inc (MFA) is currently trading at $10,08, with a 24h change of +0,39%. The 52-week trading range is $9,41–$10,11.

What are the 52-week high and low prices for MFA Financial Inc (MFA)?

x

What is the price-to-earnings (P/E) ratio of MFA Financial Inc (MFA)? What does it indicate?

x

What is the market cap of MFA Financial Inc (MFA)?

x

What is the most recent quarterly earnings per share (EPS) for MFA Financial Inc (MFA)?

x

Should you buy or sell MFA Financial Inc (MFA) now?

x

What factors can affect the stock price of MFA Financial Inc (MFA)?

x

How to buy MFA Financial Inc (MFA) stock?

x

Risk Warning

The stock market involves a high level of risk and price volatility. The value of your investment may increase or decrease, and you may not recover the full amount invested. Past performance is not a reliable indicator of future results. Before making any investment decisions, you should carefully assess your investment experience, financial situation, investment objectives, and risk tolerance, and conduct your own research. Where appropriate, consult an independent financial adviser.

Disclaimer

The content on this page is provided for informational purposes only and does not constitute investment advice, financial advice, or trading recommendations. Gate shall not be held liable for any loss or damage resulting from such financial decisions. Further, take note that Gate may not be able to provide full service in certain markets and jurisdictions, including but not limited to the United States of America, Canada, Iran, and Cuba. For more information on Restricted Locations, please refer to the User Agreement.

Other Trading Markets

Hot Posts su MFA Financial Inc (MFA)

Coinstagess

Coinstagess

11 ore fa
As of April 14, 2026, international law enforcement has struck a massive blow against "Phishing-as-a-Service" operations. In a historic first-of-its-kind joint operation, the FBI Atlanta Field Office and the Indonesian National Police have successfully dismantled the notorious W3LL phishing network. This global syndicate was responsible for orchestrating more than $20 million in fraud attempts, utilizing sophisticated tools designed to bypass even the most robust security measures. The operation culminated in the seizure of critical server infrastructure and the detention of the network's alleged lead developer, identified as G.L., in Indonesia. The W3LL Kit: Bypassing the MFA Fortress The W3LL network's primary weapon was a highly specialized phishing kit that targeted over 17,000 victims worldwide between 2023 and 2024. Adversary-in-the-Middle (AiTM): Unlike standard phishing pages, the W3LL kit employed real-time interception. It captured not just passwords, but also active authentication tokens. This allowed hackers to bypass Multi-Factor Authentication (MFA) seamlessly, gaining full access to accounts that users believed were secure.Structured Cybercrime: The network operated through an underground marketplace called W3LLSTORE, where an estimated 500 threat actors could purchase the kit for roughly $500. This marketplace facilitated the sale of over 25,000 stolen credentials before migrating to encrypted messaging apps to evade detection.Targeted Precision: The kit was designed to mimic legitimate corporate and financial login pages with perfect accuracy, leading to a massive spike in account takeovers across the digital asset and traditional banking sectors. Deepening US-Indonesia Security Ties The timing of this takedown is not coincidental, as it aligns with a major strategic shift in diplomatic relations between the two nations. Major Defense Cooperation Partnership: On April 13, 2026, the US and Indonesia announced a significant new defense framework. This partnership covers military modernization and joint Indo-Pacific exercises, but the W3LL operation proves that cybersecurity is now a primary pillar of this bilateral alignment.First-Ever Joint Takedown: This marks the first time US and Indonesian law enforcement have collaborated to physically shut down a hacking platform's infrastructure. It signals a "New Era" of zero-tolerance for cybercriminals operating within the Indonesian archipelago.A Warning to Global Syndicates: The detention of a high-level developer in Indonesia demonstrates that local jurisdictions are no longer safe havens for those building tools used to facilitate global fraud. The Growing Phishing Threat to Crypto Despite this major victory, the scale of the phishing problem remains staggering for the digital asset community. $300 Million in One Month: In January 2026 alone, crypto investors lost over $300 million to various phishing schemes. Platforms like W3LL have commoditized high-level hacking, allowing even low-skill criminals to target high-value wallets.The MFA Fallacy: The W3LL case serves as a critical reminder that MFA is not an invincible shield. As attackers move toward token-theft techniques, users must remain vigilant against suspicious links, even on "verified" or "trusted" domains.The Future of Cyber Defense: Authorities emphasize that while taking down the infrastructure is vital, the "Rebranding" of such tools is common. Continued international cooperation is the only way to stay ahead of the rapid scaling of fraud operations globally. Essential Financial Disclaimer This analysis is for informational and educational purposes only and does not constitute financial, investment, or legal advice. Reports of the FBI and Indonesian National Police dismantling the W3LL phishing network and the $20 million fraud estimate are based on official law enforcement statements and market reporting as of April 14, 2026. Phishing remains a persistent threat; no security measure is 100% effective. Users should exercise extreme caution with digital links and sensitive account information. Always conduct your own exhaustive research (DYOR) and consult with a licensed cybersecurity professional. Did the W3LL takedown make you feel safer, or is it just the tip of the iceberg in the battle against AiTM phishing?
0
0
0
0
MarketWhisper

MarketWhisper

04-14 02:24
![FBI搗毀釣魚網](https://img-cdn.gateio.im/social/moments-4354e72a22aff3a966693386d3503840) 美國聯邦調查局(FBI)亞特蘭大分局與印尼國家警察於 4 月 14 日聯合宣布,成功搗毀 W3LL 釣魚網基礎設施,查獲與逾 2,000 萬美元詐騙直接相關的關鍵技術設備,並拘留涉嫌開發者 GL。此次行動由美國喬治亞州北區檢察官辦公室提供司法支持,是美印兩國執法機構首次針對駭客平台展開的聯合打擊行動。 ## **W3LL 釣魚網路的運作機制:500 美元起的犯罪工具** W3LL 釣魚工具包的設計核心在於製造幾乎以假亂真的虛假登入頁面,誘使受害者主動輸入帳號憑證。攻擊者可透過地下市場 W3LLSTORE 以約 500 美元的低廉成本購買工具使用權,在犯罪圈迅速普及,累計約 500 名威脅行為者活躍使用,形成高度組織化的網路犯罪生態。 然而,W3LL 釣魚網路最具破壞力的功能是其中間人攻擊(AiTM)技術。攻擊者可即時攔截受害者的登入會話,在用戶輸入帳號密碼的同一瞬間同步竊取身份驗證令牌。這意味著即使帳號已開啟多因素驗證保護,攻擊者也能在驗證完成的瞬間劫持已驗證的會話,令 MFA 的防護形同虛設。 ## **犯罪規模與演進軌跡** W3LL 釣魚網路的犯罪史橫跨多年,呈現明顯的反執法進化路徑: **2019–2023 年**:W3LLSTORE 地下市場活躍,促成超過 25,000 份被盜憑證的交易流通 **市場關閉後**:業者轉移至加密通訊應用程式,持續分發重新包裝的工具,規避執法追蹤 **2023–2024 年**:工具包在全球範圍造成逾 17,000 名受害者 **2026 年 4 月 14 日**:美印聯合行動成功查封基礎設施,開發者 GL 遭拘押 整個犯罪生態系統高度組織化,從工具開發、市場銷售到實際攻擊執行,形成完整的網路犯罪供應鏈。 ## **美印安全合作:網路犯罪成聯合打擊新領域** 此次聯合查封行動的時機具有外交意義。4 月 13 日,美國與印尼正式宣布建立主要防務夥伴關係,框架涵蓋印太地區的軍事現代化、專業教育與聯合演習。W3LL 釣魚網的查封行動表明,雙邊安全合作已正式延伸至網路犯罪執法領域。 值得特別關注的是,網路釣魚對加密貨幣持有者的威脅仍在持續加劇。2026 年 1 月單月,加密貨幣投資者因網路釣魚攻擊損失金額即超過 3 億美元,顯示即使此次 W3LL 釣魚網打擊行動取得成效,整體威脅環境仍不容樂觀。 ## **常見問題** #### **W3LL 釣魚工具包為何能在網路犯罪社群中廣泛流通?** W3LL 工具包的快速普及源自兩大因素:500 美元的極低進場成本,以及其他工具罕見的多因素驗證繞過能力。低門檻加高效能的組合,使其成為有組織網路犯罪群體的首選攻擊工具,並在地下市場形成穩定的銷售供應鏈。 #### **多因素驗證(MFA)是如何被 W3LL 工具包繞過的?** W3LL 工具包採用中間人攻擊(AiTM)技術,在受害者完成 MFA 驗證的瞬間即時劫持已驗證的登入會話及身份驗證令牌,使攻擊者在不需知道第二因素的情況下,仍能以受害者身份登入目標帳戶,令傳統 MFA 保護機制失效。 #### **加密貨幣用戶如何有效防範此類進階釣魚網路攻擊?** 關鍵防禦措施包括:使用硬體安全金鑰(如 YubiKey)取代 SMS 或應用程式 OTP 作為多因素驗證方式,前者可有效抵抗 AiTM 攻擊;訪問任何平台前仔細核實域名真實性;以及避免點擊來源不明的電子郵件或訊息中的登入連結。
0
0
0
0
MetaMisfit

MetaMisfit

04-12 23:07
I've spent over a decade auditing networks, and I can tell you with certainty: the phrase 'how to keep your network safe with NFT etrsnft' is nonsense. It's a keyword trap. A red flag that someone either doesn't understand networking or is trying to sell you something that doesn't exist. You probably saw this headline somewhere. Twitter. A vendor pitch. Someone's LinkedIn post about 'blockchain security.' They're conflating two completely different things. Blockchain and actual security aren't the same. Let me be direct. I've broken into systems (with permission). Watched real breaches happen. You know what caused them? Misconfigured routers. Reused passwords. Default admin credentials nobody bothered changing. Not missing NFTs. Never NFTs. NFTs are collectibles. They prove you own a digital item. That's literally it. They don't authenticate devices. They don't encrypt traffic. They don't detect intrusions. Try integrating one into your SIEM. Go ahead. You'll get silence. No API. No standard. Nothing. I watched a midsize bank waste four months while their CTO chased 'NFT-based logins' instead of rolling out MFA. Using an NFT to secure a network is like using a concert ticket to lock your front door. It proves you were there. It stops nobody. Here's what actually works: Strong passwords plus MFA. Not one or the other. Both. I disable SMS 2FA on every client network immediately. Use Microsoft Authenticator or a hardware key instead. SMS gets intercepted. It's been proven. Patch everything. Firmware. OS updates. Every time. That router running 2021 firmware? Already compromised in three known ways. Network segmentation. If your HR VLAN can't talk to guest Wi-Fi, breach containment isn't theoretical anymore. It's automatic. An attacker jumping from your printer to your payroll server becomes impossible. Encrypted DNS. DoH or DoT. Stops local snooping and blocks DNS-based malware redirects. Costs nothing. Takes minutes to enable. Before lunch today: disable UPnP. Rename default admin accounts (seriously, 'admin'/'password' still exists everywhere). Verify automatic updates are actually running, not just checked. You don't need AI. You don't need blockchain. You need discipline. I read 47 vendor decks this year. All of them used 'NFT-secured access' or 'tokenized firewall' or 'own your network keys via NFT.' None meant anything real. Those phrases mean: we slapped an NFT wrapper on a login screen and called it innovation. Ask any vendor three questions: Where is the cryptographic key material stored? Which NIST or ISO standard does this map to? Can you show me the threat model documentation? If they hesitate, walk away. The FTC fined one company 2.5 million last year for claiming their 'NFT-authenticated VPN' met FIPS 140-2. It didn't. The CMA sent warning letters to six more. I built a real security plan for a small law firm last year. Week 1-2: shut down Telnet and SMBv1. Week 3-4: MFA everywhere. Logins, email, cloud backups. Week 5-8: segment the network. Week 9-12: run a tabletop drill. Pretend the firewall shows Cobalt Strike. See who knows where the backups live. Success isn't flashy. Zero unpatched critical CVEs in 30 days. Zero phishing clicks after month two. That's it. CISA's Shields Up checklist is free. NIST SP 800-207 is free. CIS Controls v8 is free. Use them. Consistency beats novelty every single time. I've seen too many people waste months chasing shiny security tokens while ignoring the admin password still set to 'admin123.' That's theater, not security. Real security is boring. It's updating firmware. It's checking your router right now. Open the admin page. Look for default credentials. Change them. Fifteen minutes. Your network isn't safe because it looks secure. It's safe because you acted. Go change that password before you read another word.
2
0
0
0