#CyberMonth: Is MFA Enough to Protect You Against Cyber-Attacks? (2024)

Table of Contents
Written by Kevin Poireault What Are the Four Types of MFA? Not All MFA Methods Are Phishing-Resistant Phishing-Resistant MFA Is Gaining Momentum What Are the Three Types of MFA Bypass? You may also like Rising AI-Fueled Phishing Drives Demand for Password Alternatives AnyDesk Hit by Cyber-Attack and Customer Data Breach Silicon Valley Issues Election Security Report Review: "Multi Factor Authentication for Dummies" Why Two Factors are Better than One What’s hot on Infosecurity Magazine? EmailGPT Exposed to Prompt Injection Attacks #Infosec2024: Ransomware Ecosystem Transformed, New Groups “Changing the Rules” #Infosec2024: AI Red Teaming Provider Mindgard Named UK's Most Innovative Cyber SME #Infosec2024: 104 EU Laws Have Different Definitions of Cybersecurity How to Import OST Files into Outlook How to Open and View OST Files Without Outlook How to Proactively Remediate Rising Web Application Threats How to Optimize Third-Party Risk Management Programs Through NIST CSF 2.0 Why DDoS Simulation Testing is Critical for Proactive Network Defense Disinformation Defense: Protecting Businesses from the New Wave of AI-Powered Cyber Threats Adapting to Tomorrow's Threat Landscape: AI's Role in Cybersecurity and Security Operations in 2024 #Infosec2024: Claire Williams on Leadership, Cultivating a High Performing Team and Overcoming Adversity (video) #Infosec2024: Navigating the Ransomware Toll on Victims with Jason Nurse (video) #Infosec2024: AI Red Teaming Provider Mindgard Named UK's Most Innovative Cyber SME #Infosec2024: Cyber Resilience Means Being Willing to Learn From a Crisis #Infosec2024: Experts Share How CISOs Can Manage Change as the Only Constant #Infosec2024: 104 EU Laws Have Different Definitions of Cybersecurity FAQs

News Feature

Written by

#CyberMonth: Is MFA Enough to Protect You Against Cyber-Attacks? (1)

Kevin Poireault

Reporter, Infosecurity Magazine

Multi-factor authentication (MFA) is one of the recommended cybersecurity measures that is being championed during Cybersecurity Awareness Month. Despite this, experts warn that this security measure is no longer strong enough to protect users from cyber-attacks in 2023.

MFA requires users to provide two or more factors to verify their identity when logging in to an account or performing a sensitive action.

It is an evolution of two-factor authentication (2FA), which has been in existence since 1986 when RSA, a security company, introduced its first password-generating key fob. 2FA and MFA were used in fringe applications in the 1990s and early 2000s. It was only when smartphones became mainstream that MFA started taking off.

What Are the Four Types of MFA?

Most big tech companies, including Google, Microsoft and Apple, offer several MFA login options.

Amazon Web Services (AWS) has announced it would start mandating MFA for all privileged AWS accounts from mid-2024.

MFA can be based on several different factors that are divided into four categories:

  • Knowledge factors: something the user knows, such as a password, PIN, or security question answer
  • Possession factors: something the user has, such as a smartphone, security token, or smart card
  • Inherence factors: something the user is, such as a fingerprint, facial scan, or voice recognition
  • Location factors: in a zero-trust cybersecurity environment, your physical location can be an authentication factor

Speaking to Infosecurity, Roger Grimes, a data-driven defense evangelist at cybersecurity awareness company KnowBe4, recommends using MFA over passwords when possible: “It cuts down on around half of phishing attacks.”

Not All MFA Methods Are Phishing-Resistant

However, not all MFA methods are created equal, and many can still be hacked.

“Over 70% of MFA options are nearly as easy to hack with social engineering and phishing emails as using passwords,” Grimes said.

Push-based MFA, where the user receives a notification message to a secondary location to ‘Approve’ or ‘Deny’ whenever anyone tries to log on, SMS-based MFA and email-based MFA are all subject to being hacked.

These three techniques, which use one-time-passwords, are among the most common MFA methods.

However, they are vulnerable to basic phishing attacks involving techniques like business email compromise (BEC) or SIM-swapping.

“It doesn’t take a sophisticated hacker to hack these types of MFA; you just need to follow the steps of current phishing kits,” Grimes warns.

“That’s why the message the US Cybersecurity and Infrastructure Agency (CISA) and other cybersecurity organizations promote should be to use phishing-resistant MFA.”

Most phishing-resistant MFA options use Fast IDentity Online (FIDO) standard protocols.

FIDO standards are a set of open, standardized authentication protocols developed and maintained by the non-profit FIDO Alliance, created in 2013.

FIDO authentication is based on public key cryptography, which is more secure than password-based authentication and is more resistant to phishing and other attacks.

"Many vendors mention their product is 'FIDO2-enabled' when it's clearly not true."Roger Grimes, data-driven defense evangelist, KnowBe4

FIDO supports a variety of authentication methods, including:

  • Biometrics: Fingerprint scanners, facial recognition, iris scanners, and voice recognition
  • Security keys: Physical devices that plug into a computer or mobile device and can be used to authenticate the user
  • Embedded Secure Elements (eSEs): Secure chips that are built into many smartphones and other devices
  • Trusted Platform Modules (TPMs): Security chips that are built into many computers.

FIDO authentication is supported by a wide range of web browsers, operating systems, and devices. This makes it easy for users to adopt FIDO authentication without changing their hardware or software.

The latest FIDO protocol is FIDO2, jointly developed by the FIDO Alliance and the World Wide Web Consortium (W3C). FIDO Alliance offers a FIDO certification for vendors to verify their solutions are FIDO compliant.

“I’ve noticed that many vendors mention their product is ‘FIDO2-enabled’ when it’s clearly not true. I’d suggest anyone who wants to adopt a FIDO2-enabled MFA option to turn to a reputable company such as Yubico, Google, Duo or Microsoft,” Grimes argued.

#CyberMonth: Is MFA Enough to Protect You Against Cyber-Attacks? (2)

Phishing-Resistant MFA Is Gaining Momentum

Other phishing-resistant MFA options exist outside FIDO, such as passkeys, smart cards or Microsoft Entra certificate-based authentication.

#CyberMonth: Is MFA Enough to Protect You Against Cyber-Attacks? (3)

Grimes maintains an extensive list of phishing-resistant MFA options on LinkedIn.

“Whatever MFA option you pick, moving from passwords to MFA is long, difficult and costly. If you have a choice, pick a phishing-resistant MFA option from the beginning, so that you won’t have to change again in the future,” Grimes insisted.

Governments and cybersecurity organizations have been promoting MFA over passwords for a long time, without mentioning the need for phishing-resistant MFA.

This is changing. Many organizations, including CISA and Microsoft, are now pushing for the general adoption of phishing-resistant MFA. This effort is starting to bear fruits. According to the State of Global Enterprise Authentication Survey, published in September 2022 by Yubico, 68% of UK respondents in executive positions and 63% of directors agree that their organization needs to upgrade to modern phishing-resistant MFA.

“Lately, even the US government has added a specific mention to phishing-resistant MFA in the latest version of its Digital Identity Guidelines,” Grimes added.

What Are the Three Types of MFA Bypass?

No MFA is a silver bullet against hackers. “Companies like Microsoft will tell you that MFA cuts down on over 99% of phishing attacks. I don’t believe this figure is true today,” Grimes said.

He argued that, with MFA being pushed everywhere, including during Cybersecurity Awareness Month, many threat actors have started deploying MFA bypass hacking methods.

A position shared by Grimes’ colleague Stu Sjouwerman, founder and CEO of KnowBe4. “All MFA can be hacked,” he wrote in an Infosecurity article.

There are three main approaches to MFA bypass. These are:

  • Leveraging MFA fatigue: many users will approve login prompts they didn’t approve, usually because of a lack of concentration that can be due to MFA fatigue. This tactic, called an MFA fatigue attack, has been observed in various intrusions, such as the high-profile breach that impacted Uber in 2022.
  • Token theft, which consists of stealing authentication tokens, generally through infostealer malware or adversary-in-the-middle (AiTM) attacks, granted to users upon login and completion of their own MFA challenge. The threat group Lapsus$ used token theft among other techniques, to breach Okta systems in early 2022.
  • Targeting MFA misconfigurations: poorly configured MFA methods can be exploited by hackers. In August 2023, software firm Retool announced that the accounts of 27 cloud customers were compromised after the attackers bypassed multiple security controls using SMS phishing and social engineering to compromise an IT employee's Okta account. The firm blamed the hack on a new feature in Google Authenticator that allows users to synchronize their 2FA codes with their Google account.

Read more: MFA Bypass - The Next Frontline for Security Pros

Three Tips to Counter MFA Fatigue Attacks

There are many measures organizations can take to mitigate risks posed by MFA fatigue, alongside providing more awareness training. Here are five ideas to consider:

  • Tighten authentication regimes: make sure your authentication regime takes into account all known user identity parameters
  • Adopt double authentication or adopt a single sign-on (SSO) solution
  • Add number matching to authentication requests: rather than just confirming a login attempt, require users to type in a two-digit code from the login screen to authenticate

Read more:Rising AI-Fueled Phishing Drives Demand for Password Alternatives

You may also like

  1. Rising AI-Fueled Phishing Drives Demand for Password Alternatives

    News

  2. AnyDesk Hit by Cyber-Attack and Customer Data Breach

    News

  3. Silicon Valley Issues Election Security Report

    News

  4. Review: "Multi Factor Authentication for Dummies"

    Review

  5. Why Two Factors are Better than One

    Opinion

What’s hot on Infosecurity Magazine?

EmailGPT Exposed to Prompt Injection Attacks

News

1

#Infosec2024: Ransomware Ecosystem Transformed, New Groups “Changing the Rules”

News

2

#Infosec2024: AI Red Teaming Provider Mindgard Named UK's Most Innovative Cyber SME

News

3

#Infosec2024: 104 EU Laws Have Different Definitions of Cybersecurity

News

4

How to Import OST Files into Outlook

Blog

5

How to Open and View OST Files Without Outlook

Blog

6

How to Proactively Remediate Rising Web Application Threats

Webinar

1

How to Optimize Third-Party Risk Management Programs Through NIST CSF 2.0

Webinar

2

Webinar

3

Why DDoS Simulation Testing is Critical for Proactive Network Defense

Webinar

4

Disinformation Defense: Protecting Businesses from the New Wave of AI-Powered Cyber Threats

Webinar

5

Adapting to Tomorrow's Threat Landscape: AI's Role in Cybersecurity and Security Operations in 2024

Webinar

6

#Infosec2024: Claire Williams on Leadership, Cultivating a High Performing Team and Overcoming Adversity (video)

Interview

1

#Infosec2024: Navigating the Ransomware Toll on Victims with Jason Nurse (video)

Interview

2

#Infosec2024: AI Red Teaming Provider Mindgard Named UK's Most Innovative Cyber SME

News

3

#Infosec2024: Cyber Resilience Means Being Willing to Learn From a Crisis

News

4

#Infosec2024: Experts Share How CISOs Can Manage Change as the Only Constant

News

5

#Infosec2024: 104 EU Laws Have Different Definitions of Cybersecurity

News

6

#CyberMonth: Is MFA Enough to Protect You Against Cyber-Attacks? (2024)

FAQs

#CyberMonth: Is MFA Enough to Protect You Against Cyber-Attacks? ›

Kevin Poireault. Multi-factor authentication (MFA) is one of the recommended cybersecurity measures that is being championed during Cybersecurity Awareness Month. Despite this, experts warn that this security measure is no longer strong enough to protect users from cyber-attacks in 2023.

What does the MFA protect against? ›

Multi-Factor Authentication (MFA), a cornerstone of security solutions, protects networks and systems against illegal entry. This security solution protects organizations and users against typical cyber attacks and restricts intrusion, so that essential resources are only available to authorized users.

Can hackers get through MFA? ›

The bottom line is that MFA is not un-hackable, but having it in place does make it a lot harder for attackers to access your users' accounts. If your organization has a robust MFA solution in place, an opportunist hacker may well look for easier targets.

How effective is multifactor authentication at deterring cyberattacks? ›

Our findings reveal that MFA implementation offers outstanding protection, with over 99.99% of MFA-enabled accounts remaining secure during the investigation period.

How can multi-factor authentication help protect against phishing attacks? ›

MFA has played an important part in the fight against phishing by making it more difficult for malicious hackers to employ end users' login credentials for their gain.

Is MFA really secure? ›

Multi-factor authentication (MFA) is known for being the gold standard in security access. It helps protect sensitive accounts and data by requiring an extra layer of authentication such as a password, PIN, or One-Time Password (OTP).

How effective is multifactor authentication? ›

The use of MFA on your accounts makes you 99% less likely to be hacked.

Which MFA should be avoided? ›

Factors that rely on your phone number, such as SMS and phone calls should be avoided if possible as they are the least secure and provide the worst user experience.

Can a hacker bypass two-factor authentication? ›

Most 2FA methods involve sending temporary codes via SMS or emails, but these can be easily intercepted by hackers through account takeover, SIM swapping, and/or MitM attacks.

What is the safest form of MFA? ›

Most Secure: Hardware Keys

External hardware keys, like Yubikeys, are among the strongest authentication factors available. Also called FIDO keys, they generate a cryptographically secure MFA authentication code at the push of a button.

What is the weakness of multifactor authentication? ›

These eight MFA weaknesses can make your system easier for attackers to exploit:
  • Lack of user education. ...
  • Social engineering attacks. ...
  • Phishing attacks. ...
  • Man-in-the-middle (MITM) attacks. ...
  • Malware and keyloggers. ...
  • Single point of failure. ...
  • Complexity and usability. ...
  • Lack of regular updates.
Nov 10, 2023

How much does MFA reduce risk? ›

MFA protects businesses by adding a layer of security that can block 99.9% of attacks stemming from compromised accounts. For example, a phishing attack may obtain a user's credentials, but be unable to provide the fingerprint or security question response required for authentication.

What attacks are prevented by multifactor authentication? ›

MFA is a very effective approach to neutralize credential stuffing attacks, in which cybercriminals automatically and simultaneously try a list of stolen usernames and passwords on multiple sites.

What threat would even bypass a multifactor authentication? ›

When threat actors try to bypass multifactor authentication, they seek to gain access to the code sent to phones. SIM jacking is one popular method threat actors use to get their hands on these codes. SIM jacking is when a threat actor hijacks a SIM card and poses as the owner associated with the SIM card.

Can multi-factor authentication be compromised? ›

Like all software, MFA technology has bugs and weaknesses that can be exploited. Most MFA solutions have had exploits published which temporarily exposed opportunities for hacking.

What type of attacks can mutual authentication prevent? ›

Mutual authentication can prevent spoofing attacks because the server will authenticate the user as well, and verify that they have the correct session key before allowing any further communication and access.

What does two-factor authentication protect against? ›

2FA protects against phishing, social engineering and password brute-force attacks and secures your logins from attackers exploiting weak or stolen credentials. This dramatically improves the security of login attempts.

What can multi factor authentication be used to prevent? ›

Multi-factor authentication acts as an additional layer of security to prevent unauthorized users from accessing these accounts, even when the password has been stolen.

Top Articles
Latest Posts
Article information

Author: Cheryll Lueilwitz

Last Updated:

Views: 6115

Rating: 4.3 / 5 (54 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Cheryll Lueilwitz

Birthday: 1997-12-23

Address: 4653 O'Kon Hill, Lake Juanstad, AR 65469

Phone: +494124489301

Job: Marketing Representative

Hobby: Reading, Ice skating, Foraging, BASE jumping, Hiking, Skateboarding, Kayaking

Introduction: My name is Cheryll Lueilwitz, I am a sparkling, clean, super, lucky, joyous, outstanding, lucky person who loves writing and wants to share my knowledge and understanding with you.