Multi-factor authentication (MFA) is a great way to step up every organization’s cybersecurity, offering a high level of protection from breaches, hacks, and unauthorized access.
For many people, MFA may just be the perfect cybersecurity solution—unfortunately, it’s not.
MFA is great, but it’s not unhackable. It’s not the key to an impenetrable IT system.
In the words of Data-driven Defense Evangelist Roger Grimes, “It’s a good thing to have, it’s a good thing to use, but you can hack any multi-factor authentication method.”
MFA isn’t the all-in-one cybersecurity solution every organization wants to have, but it’s still a very useful one.
Before we dive into the common ways hackers get around MFA solutions, let’s have a recap on what MFA is and how it works.
Multi-factor authentication is a security method in which a user is required to present two or more factors to an authentication mechanism in order to be given access to a computer, application, or program.
In
his KnowBe4 webinar, Grimes breaks down MFA into three distinct processes:
| More info here:
What is MFA and How Can It Protect Your Practice?
Despite its convenience and security, MFA is still vulnerable to hackers who have managed to find loopholes in its mechanism.
According to Grimes, no matter how you authenticate access—whether it’s through single-factor authentication, multi-factor authentication, biometrics, etc.—you will end up with the same kind of access control that everyone else gets, which is a text-based cookie called a session token.
All a malicious actor needs to do is get past the security mechanism of MFA, slip themselves in between the authentication and authorization processes, and then steal that session token from you.
They can then have complete access to your bank accounts, credit card accounts, corporate emails, work applications, and other accounts online. And because MFA involves completely different processes—often not linked to each other—underlying systems wouldn’t be able to detect the impersonation.
Network session hijacking is one of the most common MFA hacking methods and has been effectively used by malicious actors for decades. They can do this by:
To be more specific, here are four of the most common ways hackers are getting past MFA solutions.
Hackers’ go-to technique to hijack a session is through a man-in-the-middle (MitM) attack.
Hackers execute MitM attacks by inserting themselves and their tools in between the client (the potential victim) and the server. They wait until the client carries out the authentication process on the legitimate server and when the resulting access session token is issued, they steal it, use it, and take over the user session.
Here’s a sample man-in-the-middle attack that could happen to anyone who falls for the attacker’s tricks:
An important thing to remember when connecting to the Internet is this: Make sure your connection is secure because cyber attacks are more likely to occur over connections that aren’t.
Only visit secure websites. Make sure the sites you visit are secure. Here are two ways to find out that they are:
Remember, the letter S stands for
secure, which means these sites have the mechanism to encrypt data and prevent attackers from intercepting communications.
Man-in-the-endpoint attacks are similar to man-in-the-middle attacks…the difference lies in where the stealing takes place. Instead of inserting themselves between you and the server, hackers using man-in-the-endpoint attacks execute their cybercrime on your device.
Here’s an example of a man-in-the-endpoint attack. It’s a technique that hackers have been using since the 1990s:
Keep a careful eye out for phishing scams. With cyber attackers getting more and more creative, spotting a phishing scam before you actually fall for it is tough…but it can be done.
With regular employee cybersecurity training, you should be able to recognize a phishing scam, know how to respond to it, and know how to avoid similar attacks in the future.
For a more detailed explanation on what phishing attacks are and how you can protect yourself and your practice from it, check out
this
blog
post.
Because Short Message Service (SMS) drives the majority of messaging communications, SMS-based MFA is a very convenient and common security layer. Unfortunately, because SMS-based MFA is widely used, cyber attackers are looking for more and more ways to bypass it. SIM swapping is one of the ways hackers use to do this.
SIM stands for Subscriber Identity Module and it contains network-specific information that is used to authenticate and identify subscribers on a network. Traditionally stored in smart cards, the SIM is currently often stored and moved digitally.
In a SIM swapping attack, the attacker transfers the victim’s SIM information to another device. This allows them to receive all of the codes sent by an SMS-based MFA tool.
A SIM swapping attack typically happens after a hacker retrieves certain key information about you through a precursor phishing attack. Here’s how it works:
Avoid using SMS-based MFA solutions. This is a lot easier said than done, especially since so many applications and organizations utilize it. But it’s important to know that even the National Institute of Standards and Technology (NIST) does not accept SMS codes as valid authentication because of how easy it is to hack.
Instead, consider using non-SMS-based MFA solutions. This means that the authentication process depends on the user and not just on a phone number or SIM. They’re not the perfect solution, but they’re a lot harder to hack than SMS-based MFA.
There are several great options in the market right now, but if you’re looking for MFA solutions recommended by cybersecurity experts, you can
reach out to our team and we’ll help you out.
SMS rogue recovery is a cyber attack technique where a hacker only requires these pieces of information: Your phone number, your email address, and a service you belong to that has an SMS-based recovery method.
An SMS rogue recovery attack takes advantage of an inherent problem with SMS—SMS message origination can’t be easily authenticated. Anyone can pretend to be anyone.
Here’s how an SMS rogue recovery attack can happen to anyone:
Keep in mind that SMS recovery codes should be typed onto browsers. They’re not typically not sent back or forwarded via SMS.
It’s also helpful to avoid being fully dependent on SMS-based recovery methods. Take advantage of technology and implement a few extra security features (such as MFA solutions) at multiple points in all your accounts. They may not be perfect, but they can definitely slow down or discourage hackers.
Every organization that’s concerned about cybersecurity is always on the lookout for a solution that offers the perfect blend of convenience and security. Many thought that MFA was the answer.
Unfortunately, it’s not…because there is no one-size-fits-all solution when it comes to cybersecurity.
Having a single tool or software just won’t cut it. What you need is a cybersecurity partner that can cover all bases—one that understands your organization’s needs, specializes in your industry, has the tools to keep your organization secure, and offers 24/7 support.
ER Tech Pros offers
tried-and-tested cybersecurity services to healthcare practices all over the US. If you’re looking for a cybersecurity partner but not quite sure how to go about things, a consultation call with ER Tech Pros can be the perfect place to start.
Search Articles
8795 Folsom Blvd., Suite #205
Sacramento, CA 95826
(855) ER-TECH-1 / (855) 378-3241
info@ertech.io
Resources
Search this Site
ERTech Pros | All Rights Reserved.