Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

9/28/2020
09:00 AM
50%
50%

MFA-Minded Attackers Continue to Figure Out Workarounds

While MFA can improve overall security posture, it's not a "silver bullet" -- and hacks continue.

As online users become increasingly aware of and use multifactor authentication (MFA), attackers are devising new ways to circumvent the technology — and often with great success.

Earlier this month, for example, security firm Proofpoint reported its disclosure of critical vulnerabilities in Microsoft WS-Trust that could be used to circumvent MFA on cloud services that use the technology — chief among them, Microsoft 365. An attack could have allowed a cybercriminal to use credentials obtained from phishing and credential dumps to log into Office 365, Azure, and other Microsoft services, Proofpoint stated.

Related Content:

Younger Generations Drive Bulk of 2FA Adoption

State of Endpoint Security: How Enterprises Are Managing Endpoint Security Threats

New on The Edge: RASP 101: Staying Safe With Runtime Application Self-Protection

Such vulnerabilities are one way of working around the additional security provided by MFA. While security experts underscore that MFA improves the overall security of online users, exploitable vulnerabilities and poor user decisions can undermine those protections.

"When it comes to cloud security, MFA is not a silver bullet," said Or Safran, senior threat detection analysis at Proofpoint, in an analysis of the vulnerabilities. "As more organizations adopt the technology, more vulnerabilities will be discovered and abused by attackers. However, MFA can improve overall security posture, especially when combined with people-centric threat visibility and adaptive access controls."

As more people access valuable accounts online, two-factor authentication (2FA) and MFA have become more popular. In a December 2019 report, security firm Duo Security found adoption of 2FA among users had nearly doubled in two years, with 53% of survey respondents using 2FA for some of their accounts (up from 28% in 2017). More than two-thirds of younger people — 34 years old or younger — used 2FA on some accounts, while only a third of people ages 65 or older used the technology, according to the study.

The critical vulnerabilities found by Proofpoint are the latest exploitation scenarios to target the increasingly popular security technologies. Last year, the FBI warned that cybercriminals had adopted a variety of measures to workaround or circumvent MFA. In one cited example from 2019, a code injection error in a banking institution's website allowed attackers to enter "a manipulated string" into the multifactor field, instead of a PIN, and bypass the second factor, according to the FBI advisory.

Yet, while such technical bypasses are not rare, far more common are attackers' efforts to insert themselves in the MFA process and steal passcodes or security tokens. Circumventing MFA often boils down to taking advantage of credulous users, says Roger Grimes, data-driven defense analyst at KnowBe4, a security training firm.

"The broad attacks that spammers and phishers often send out to gather credentials — MFA can prevent those types of attacks," he says. "But when attackers know that the user has MFA, it often proves to not be much of a barrier and, in some cases, makes it even easier."

The most common type of MFA attack is to intercept the one-time passcode. Real-time attacks use a man-in-the-middle proxy to grab the one-time password that the user enters into what they believe to be a legitimate site. In 2019, cybersecurity researchers released a tool, dubbed Muraena, that allows the harvesting of the second factor. A common target is the widely deployed technology for sending one-time passwords via text messages, a defense so broken that the National Institute of Standards and Technology (NIST) warned against its use in May 2016

Another common approach is to steal the security token sent to the user to simplify future logins. Reusing the token can allow an attacker to access the user's account. Finally, technical attacks on the software, often targeting support for legacy security technologies, can allow widespread attacks on services protected by MFA. 

"From our perspective in monitoring email, cloud, and hybrid attacks, the largest increase in threat activity has been tied to malicious third-party apps abusing OAuth tokens, which Microsoft calls 'consent phishing,'" says Ryan Kalember, executive vice president of cybersecurity strategy at Proofpoint.

The best technologies at present to limit attacks are those based on the latest Fast Identity Online (FIDO) standard, FIDO2, which uses device identity to harden the authentication process against remote attackers, and a variety of push technologies that alert the user on a registered device of any attempted access and requires them to approve that access.

"There is a lot of crap out there, but there are also good solutions, and they are developing better solutions," KnowBe4's Grimes says. "But everything is hackable, so on top of that, you need to train your end users to recognize the attacks. Just because you have MFA does not mean that you can't be hacked."

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/27/2020
Botnet Infects Hundreds of Thousands of Websites
Robert Lemos, Contributing Writer,  10/22/2020
Chinese Attackers' Favorite Flaws Prove Global Threats, Research Shows
Kelly Sheridan, Staff Editor, Dark Reading,  10/27/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27974
PUBLISHED: 2020-10-28
NeoPost Mail Accounting Software Pro 5.0.6 allows php/Commun/FUS_SCM_BlockStart.php?code= XSS.
CVE-2020-27975
PUBLISHED: 2020-10-28
osCommerce Phoenix CE before 1.0.5.4 allows admin/define_language.php CSRF.
CVE-2020-27976
PUBLISHED: 2020-10-28
osCommerce Phoenix CE before 1.0.5.4 allows OS command injection remotely. Within admin/mail.php, a from POST parameter can be passed to the application. This affects the PHP mail function, and the sendmail -f option.
CVE-2020-27978
PUBLISHED: 2020-10-28
Shibboleth Identify Provider 3.x before 3.4.6 has a denial of service flaw. A remote unauthenticated attacker can cause a login flow to trigger Java heap exhaustion due to the creation of objects in the Java Servlet container session.
CVE-2020-22552
PUBLISHED: 2020-10-28
The Snap7 server component in version 1.4.1, when an attacker sends a crafted packet with COTP protocol the last-data-unit flag set to No and S7 writes a var function, the Snap7 server will be crashed.