• Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions
Flyy Tech
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs
  • Camera
  • Audio
No Result
View All Result
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs
  • Camera
  • Audio
No Result
View All Result
Flyy Tech
No Result
View All Result

Multi-factor authentication fatigue attacks are on the rise: How to defend against them

flyytech by flyytech
September 23, 2022
Home Security
Share on FacebookShare on Twitter


Credential compromise has been one of the top causes for network security breaches for a long time, which has prompted more organizations to adopt multi-factor authentication (MFA) as a defense. While enabling MFA for all accounts is highly encouraged and a best practice, the implementation details matter because attackers are finding ways around it.

One of the most popular ways is spamming an employee whose credentials have been compromised with MFA authorization requests until they become annoyed and approve the request through their authenticators app. It’s a simple yet effective technique that has become known as MFA fatigue and was also used in the recent Uber breach.

Uber, LAPSUS$ and past breaches

Uber suffered a security breach last week where a hacker managed to access some of its internal systems, including G-Suite, Slack, OpenDNS and HackerOne bug bounty platform. As details about the hack were coming to light, some security researchers managed to speak to the hacker who seemed eager to take responsibility and share some of the details about how the attack was performed.

In one conversation shared on Twitter by security researcher Kevin Beaumont, the hacker said: “I was spamming [an] employee with push auth for over an hour. I then contacted him on WhatsApp and claimed to be from Uber IT. Told him if he wants it to stop he must accept it. And well, he accepted and I added my device.”

Uber has since partially confirmed this information, saying in a security incident update that the victim was an external Uber contractor who had his Uber credentials stolen after their device was infected with malware. The company believes the hacker likely bought the credentials from the dark web and initiated the MFA fatigue attack.

“The attacker then repeatedly tried to log into the contractor’s Uber account,” the company said. “Each time, the contractor received a two-factor login approval request, which initially blocked access. Eventually, however, the contractor accepted one, and the attacker successfully logged in.”

Uber also believes the attacker is associated with the extortion group LAPSUS$, which has been responsible for breaches at various technology companies this year including Microsoft, Cisco, Samsung, Nvidia, and Okta. In March 2022, London police arrested seven individuals aged 16 to 21 for their alleged involvement with the group and while the LAPSUS$ activity has since slowed down, many researchers believed the group might have more branches and members.

Uber said that LAPSUS$ has used similar techniques against its past victims. Indeed, the Okta breach which has been claimed by LAPSUS$ was achieved by targeting a support engineer working for an external technical support provider called Sykes Enterprises, a subsidiary of Sitel. The incident was detected when attackers attempted to add a new authentication factor to the engineer’s account from a new location and the request was declined. While it’s not clear if MFA fatigue was attempted in that case, Telegram screenshots show LAPSUS$ members discussing the technique.

“Signin with smartcard doesn’t have any MFA,” one of the members tells another one. “Signin with password will issue MFA through a phone call or authentication app. However, no limit is placed on the amount of calls that can be made. Call the employee 100 times at 1am while he is trying to sleep and he will more than likely accept it. Once the employee accepts the initial call, you can access the MFA enrollment portal and enroll another device.”

“Even Microsoft!,” another user says. “Able to login to an employee’s Microsoft VPN from Germany and the USA at same time and they didn’t even seem to notice. Also was able to re-enroll MFA twice.”

How MFA fatigue exploits the human factor

Like social engineering, these MFA spam attacks bank on users’ lack of training and understanding of attack vectors. Getting MFA right is a balancing act. Being strict and invalidating sessions often will generate frequent MFA prompts and employees might grow tired of them or view them as excessive — just something new to click through to resume their work. Then when MFA fatigue attacks happen and they’re spammed with a large number of push notifications, they might just assume the already annoying system is malfunctioning and they’ll accept the notification like they did many times before.

“Many MFA users are not familiar with this type of attack and would not understand they are approving a fraudulent notification,” researchers from security firm GoSecure said in a blog post earlier this year. “Others just want to make it disappear and are simply not aware of what they are doing since they approve similar notifications all the time. They can’t see through the ‘notification overload’ to spot the threat.”

On the other hand, if the MFA policies are too lax, then authenticated sessions are long-lived, IP changes don’t trigger new prompts, new MFA device enrollments don’t trigger warnings, and organizations risk not being alerted when something like an authentication token that already passed the MFA check has been stolen. While Okta was temporarily breached, there is something positive to learn from the incident. Some of the company’s MFA policies worked and an alert was triggered when hackers attempted to enroll a new MFA device to the account.

How to mitigate MFA fatigue attacks

Organizations need to both train their employees to spot these new attacks and put technical controls in place to lower the potential for MFA abuse. Restricting available MFA methods, enforcing rate limits for MFA requests, detecting location changes for authenticated users can mitigate some of these risks. If some authentication providers don’t offer these controls, customers should ask for them.

“Seeing an increasing amount of abuse of MFA prompt ‘push’ notifications,” Steve Elovitz, an incident responder with Mandiant, said on Twitter in February. “Attackers are simply spamming it until the users approve. Suggest disabling push in favor of pin, or something like @Yubico for simplicity. In the meantime, alert on volume of push attempts per account.”

“Yubico” refers to physical devices such as USB thumb drives that use the FIDO2 authentication protocol to validate authentication requests and transmit them to the application in a secure way. Following the new Uber breach, Elovitz clarified that one-time passwords/pins (OTPs) are far from an ideal second factor, but they are better than push and that FIDO2-compliant implementations are obviously the best option.

Beaumont has also echoed the advice to disable MFA push notifications and advises Azure and Office 365 customers to enable Microsoft’s new “number-matching” MFA policy. The number-matching option, which was added this year, requires the user to input a number they received on the authentication page into their authenticator app. This is the reverse of the OTP method where the user types a code generated by their mobile authenticator app into the authentication page. It’s also much safer than the authentication process triggering a push notification on the user’s phone that they just need to click “Yes”, or worse, calling them in the middle of the night as the LAPSUS$ attackers suggested.

“When protecting against MFA attacks of all sorts, it’s important to mandate MFA anytime a personal profile is changed to keep malicious actions from going unnoticed, and set up proactive reviews of risky events,” Shay Nahari, VP red team services at CyberArk, said in a blog post about recent techniques used in major social engineering attacks, including MFA fatigue. “Additionally, your SOC can leverage user behavior analytics to set contextual triggers that notify if anomalous behaviors are detected, or block user authentication from suspicious IP addresses.”

Copyright © 2022 IDG Communications, Inc.





Source_link

flyytech

flyytech

Next Post
Researchers Uncover Mysterious ‘Metador’ Cyber-Espionage Group

Researchers Uncover Mysterious 'Metador' Cyber-Espionage Group

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

Scammers Mimic ChatGPT to Steal Business Credentials

Scammers Mimic ChatGPT to Steal Business Credentials

February 23, 2023
How to Sound Design First-Person Shooter Gunshot Sound Effects

How to Sound Design First-Person Shooter Gunshot Sound Effects

December 7, 2022

Trending.

Image Creator now live in select countries for Microsoft Bing and coming soon in Microsoft Edge

Image Creator now live in select countries for Microsoft Bing and coming soon in Microsoft Edge

October 23, 2022
Review: Zoom ZPC-1

Review: Zoom ZPC-1

January 28, 2023
Elden Ring best spells 1.08: Tier lists, sorceries, incantations, and locations

Elden Ring best spells 1.08: Tier lists, sorceries, incantations, and locations

January 14, 2023
Allen Parr’s false teaching examined. Why you should unfollow him.

Allen Parr’s false teaching examined. Why you should unfollow him.

September 24, 2022
How to View Ring Doorbell on a Roku TV

How to View Ring Doorbell on a Roku TV

December 20, 2022

Flyy Tech

Welcome to Flyy Tech The goal of Flyy Tech is to give you the absolute best news sources for any topic! Our topics are carefully curated and constantly updated as we know the web moves fast so we try to as well.

Follow Us

Categories

  • Apple
  • Applications
  • Audio
  • Camera
  • Computers
  • Cooking
  • Entertainment
  • Fitness
  • Gaming
  • Laptop
  • lifestyle
  • Literature
  • Microsoft
  • Music
  • Podcasts
  • Review
  • Security
  • Smartphone
  • Travel
  • Uncategorized
  • Vlogs

Site Links

  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions

Recent News

What are ChatGPT plugins? Here’s everything you need to know

What are ChatGPT plugins? Here’s everything you need to know

March 24, 2023
New DPA Pencil Mics — AudioTechnology

New DPA Pencil Mics — AudioTechnology

March 24, 2023

Copyright © 2022 Flyytech.com | All Rights Reserved.

No Result
View All Result
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs

Copyright © 2022 Flyytech.com | All Rights Reserved.

What Are Cookies
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT