Why Two-Factor Authentication Is No Longer Enough (2024)

Two-Factor Authentication (2FA) is dead. Long live Multi-Factor Authentication (MFA)! For years, many have considered 2FA to be synonymous with MFA, but in reality, they are very different entities.

Having two distinct forms of authentication, such as something you know (like a password) and something you have (like a token or a cellphone), can still leave your organization vulnerable to a particularly nasty Denial of Service (DoS) situation.

The Problem

Let me illustrate this with the industry-leading Cisco Secure Client, also known as AnyConnect which is used for remote connectivity through a VPN connection; many other remote access tools have the same problem and this isn’t unique to just Cisco.

A Hacker's Mindset

Recommended by LinkedIn

VoIP Security – How To Protect Your Business Jason Stephen Ali 8 years ago
VoIP Network Security 101: Protecting Your Business… Thomas B. 1 year ago

Figuring out a username for email, remote access, or VPN is relatively easy, as most organizations use a format along the lines of: First Initial, Last Name, @ company domain. A hacker can go onto LinkedIn, look at the company they want to target, and find a user by their profile and position.

Even for security-mature organizations that use more complicated usernames (not based on First / Last names, etc.), it's easy to figure out the username by looking at the headers in an email message. This is a little extra work for the hacker but not an insurmountable hurdle if they can get a hold of an email message.

With a victim’s username, the hacker will now attempt to break in to the Cisco Secure Client login portal on the Firewall using a dictionary attack against the victim's account. Multiple failed login attempts lead to the user’s account being locked, frustrating the user and wasting time for your service desk to reset the account.

After this happens a few times, you might adjust your security settings so that lock-outs only occurs after a failed 2FA attempt, but that isn’t easy to do with the Firewall that is used with Cisco Secure Client and requires you making changes in your backend user directory. In response to this, a hacker might social engineer a way to get the user's password. Alternatively, the user could have poor password hygiene and have reused a password from a compromised website. The hacker now gets lucky by using a list of compromised passwords they bought off the dark web.

Even if the user doesn't respond to a push login request or doesn't enter a One-Time Password (OTP) when prompted, a hacker still knows they have a working password now; how, because the delay for the denied message takes longer...

Most of us know where this is going; the hacker is persistent in their login attempts. After being continuously prompted either the victim end-user makes a mistake on a push message (known as "2FA fatigue") or becomes so paranoid about trying to use anything themselves because their user account is under attack that they suffer a self-inflicted DoS attack until someone on the help desk can reassure them that everything is okay. Ask yourself: is your help-desk staffed and trained to be able to handle that type of a call?

The Solution

One of the most overlooked security best practices is Defense in Depth. Go back to the basics and use signing with certificates. No different than using key pairs with protocols like Secure Shell (SSH), we sign (trust) the devices that the users can use to login from and only allow those devices to attempt logins.

Here is the Multi-Factor Authentication process:

  1. Only devices with a certificate from the Enterprise CA can attempt to login to the VPN. This prevents drive-by attacks, DoS attacks, and username identification – "something you have."
  2. The VPN authentication process still has the username & password prompt – "something you know."
  3. Your user still gets the push notification on their cellphone and must accept it – "something you have AND something you must do."

While I mention the Cisco Secure Client, this same process and framework can be used for Secure Access Service Edge (SASE), Outlook Web Access Portals, or just about any other remote access method that a user has at their disposal.

SASE typically includes a client application installed which will sign the user's machine, but that machine should still have 2FA protection to log in. Implementing certificates/signing without 2FA still leaves your organization vulnerable to compromised machines, but signing certificates along with using 2FA Push is now the recommended minimum-security posture for organizations.

Security for organizations needs to be constantly reviewed and updated because there is so much easy money to be made by hackers that they will continue to evade our detection and evolve their techniques because they can make a very decent living just targeting the low hanging fruit — sorry, poorly defended organizations — on the Internet.

Stop using 2FA and adopt MFA, because “Two can be as bad as one, it’s the loneliest number since the number one.”

The biggest piece of advice I can give to any business owner right now is not to become complacent and make sure your MSP stays on top of trends in the industry — if they keep telling you that your organization must do more, then they are doing their job. The second they tell you that your organization is completely safe and secure, it is time to find a new provider.

Why Two-Factor Authentication Is No Longer Enough (2024)

FAQs

Why Two-Factor Authentication Is No Longer Enough? ›

Having two distinct forms of authentication, such as something you know (like a password) and something you have (like a token or a cellphone), can still leave your organization vulnerable to a particularly nasty Denial of Service (DoS) situation.

Why is 2FA no longer safe? ›

One of the main reasons why 2FA is no longer secure is that hackers have become increasingly sophisticated in their methods of attack. For example, phishing attacks have become more sophisticated, making it easier for hackers to obtain user credentials through deceptive email messages or fake login pages.

What is the problem with two-factor authentication? ›

Criminals can call users and pose as banks or trusted agents and ask to confirm the passcode that was sent to them, or provide links to spoofed websites through phishing attacks. They can also pose as users and contact cell phone carriers in an attempt to carry out a SIM cloning attack.

What are the limitations of two-factor authentication? ›

2FA, and multi-factor authentication as a whole, is a reliable and effective system for blocking unauthorized access. It still, however, has some downsides. These include: Increased login time – Users must go through an extra step to login into an application, adding time to the login process.

Is two-factor authentication enough? ›

2FA provides an additional layer of security beyond traditional username and password combinations. This extra step ensures that even if login credentials are compromised, unauthorized access is prevented without the second factor.

Why is MFA not enough? ›

MFA isn't strong enough

In fact, some MFA implementations are simply ineffective. For example, some are susceptible to cyberthreats, such as push bombing, in which cyberattackers push out a high volume of notifications to end users requesting they enter their credentials.

Can you still get hacked with 2FA? ›

Can two-factor authentication be hacked? We now know how 2FA prevents hacking, but can hackers get past 2FA? The short answer: Yes, 2FA can be bypassed by hackers. But before we get into the potential weaknesses of 2FA, it's worth noting that even the biggest cybersecurity companies aren't immune to digital attacks.

Is 2FA outdated? ›

Despite this auth method's popularity with users, SMS 2FA costs are becoming so cumbersome that it will get phased out even faster than passwords. And no technology will accelerate that decline faster than passkeys.

What are the weaknesses of 2 factor authentication? ›

Disadvantages of two-factor authentication:
  • Factors can get lost. There is no certainty that your authentication factors will be available when you need them. ...
  • False security. Two-factor authentication provides a level of security, but it's typically exaggerated. ...
  • It can be turned against users.
Oct 25, 2017

Why remove two-factor authentication? ›

Your account is more secure when you need a password and a verification code to sign in. If you remove this extra layer of security, you will only be asked for a password when you sign in. It might be easier for someone to break into your account.

What is better than 2 factor authentication? ›

Multi-Factor Authentication: A Step Beyond

2FA uses two items. Multi-factor authentication uses two or more items for authentication. Using a password and an email address, for instance, is always going to be inherently less secure than using a password, email address, and also a physical device.

What are the criticism of two-factor authentication? ›

The problem with 2FA isn't 2FA itself. It's how it's deployed. If an attacker can break any link in the 2FA chain, he can break into your systems. Some of the methods recently used to crack 2FA are good old phishing and social engineering.

What is the weakest authentication factor? ›

Passwords are considered to be the weakest form of the authentication mechanism because these password strings can be exposed easily by a dictionary attack. In this automated framework, potential passwords are guessed and matched by taking arbitrary words.

What is the strongest form of two-factor authentication? ›

FIDO U2F is the most secure form of 2FA that prevents against password cracking, man-in-the-middle, and phishing attacks. Learn more about FIDO U2F here.

What are the risks of multi-factor authentication? ›

One of the biggest problems with MFA is that it can be hacked. As seen in the last section, SMS and voice-based one-time passwords (OTPs) are incredibly vulnerable to phishing attacks, as they can easily be intercepted by a malicious actor.

Can you beat two-factor authentication? ›

Tech-savvy attackers can even bypass two-factor authentication without knowing the victim's login credentials. Man-in-the-middle (MiTM) attacks describe the phenomenon of a third party, also known as a man-in-the-middle, intercepting the communication between two systems.

Why shouldn't you use 2FA? ›

SMS-based 2FA is the weakest kind

Phone numbers simply aren't a secure form of identification. Bad actors can trick network carriers into transferring your phone number to their SIM card, in an attack known as SIM swapping, or pay another company to reroute your text messages to their number.

Why is SMS authentication not safe? ›

Without a good mobile defense, hackers can easily intercept and read your messages through spoofing or phishing. This is because SMS messages are not encrypted and rely only on the security of phone networks and companies–which are notoriously easy to access.

Why is 2FA invalid? ›

If you are receiving an error 'Wrong Token' when entering your 2FA code, the most common cause is the time on your mobile device may be out of Sync with the date and time. Another common cause for the notification message may be due to the token being incorrect for the email of the account.

Is enabling 2FA safe? ›

We highly recommend enabling two-factor authentication (2FA) for the following reasons: Security! 2FA increases the security of your account. Even if somebody guesses your password, they won't be able to access your account.

Top Articles
Latest Posts
Article information

Author: Eusebia Nader

Last Updated:

Views: 5540

Rating: 5 / 5 (80 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Eusebia Nader

Birthday: 1994-11-11

Address: Apt. 721 977 Ebert Meadows, Jereville, GA 73618-6603

Phone: +2316203969400

Job: International Farming Consultant

Hobby: Reading, Photography, Shooting, Singing, Magic, Kayaking, Mushroom hunting

Introduction: My name is Eusebia Nader, I am a encouraging, brainy, lively, nice, famous, healthy, clever person who loves writing and wants to share my knowledge and understanding with you.