You are here

MFA is Being Bypassed with More Fervor

MFA is Being Bypassed with More Fervor

Created: Thursday, August 25, 2022 - 14:30
Categories:
Cybersecurity, Security Preparedness

Despite the ability to significantly reduce the risk from account takeovers, MFA is not without its challenges. While MFA is a simple control to use, configuring it isn’t necessarily so seamless – yet it’s a control that can’t be dismissed. From MFA push notification fatigue to exploiting weaknesses in self-enrollment configurations, multiple threat actor types seem to be increasingly bypassing this important cyber defense technique. Accordingly, recent compromises regarding Okta, Twilio, Cloudflare, and Cisco highlight the determination and success threat actors are exhibiting at gaining valid credentials, including accounts with MFA, especially Microsoft accounts.

Therefore, with MFA bypass being reported more frequently and threat actors’ propensity to violate one of the most used platforms, it’s crucial for organizations to be aware of the different techniques being observed and how to best protect against them. A recent article at HelpNetSecurity, Attackers take over dormant Microsoft accounts and set up MFA provides a good overview of several MFA bypass techniques being observed against Microsoft accounts. Access HelpNetSecurity to review.

For additional posts on MFA bypass techniques and incidents: