How to Bypass MFA - A Real Time Example (It's easy)

preview_player
Показать описание
Not all multi-factor authentication (MFA) can offer the same level protection against different types of attacks.

In this video we’re going to demonstrate just how easy it is for phishing attacks to steal a user’s credentials and authenticated session cookie. Even with MFA in place.

To set the scene we have Alice who works for a business that operates in the cloud.

1. She has a Microsoft 365 account, and she has some responsible roles looking after the company's Azure estate.

2. She uses a very secure password, over 128 characters long

3. and she's configured push based multifactor authentication using the Microsoft Authenticator app on her company phone to secure her access

However, having MFA in place with a secure password doesn’t mean her account is safe from adversary or man in the middle phishing attacks.

We’re going to show you how.

HOW BUSINESSES CAN PROTECT THEMSELVES

As you can see, having MFA enabled and set up does not necessarily mean that you or your users are secure. Different multifactor authentication technologies provide different levels of security. Targeted spear phishing can often look legit, with business email compromise being a common attack vector used by hackers. Phishing URLs can also be easily configured to temporarily lay dormant and redirect to legitimate URLs, whilst a spear phishing campaign is started.

Phishing resistant methods utilising web authentication, such as FIDO 2, for example, is one such MFA method, which is resistant to this type of attack.

FOLLOW THE TEAM

TIME STAMPS

Intro 00:00-01:07

Setting the scene 01:08 - 02:20

Setting up the attack - 02:21 - 04:10

Bypassing MFA - 04:12 - 06:18

Preventing the attack 06:19 - 08:26

Key takeaways - 08:27 - 10:05
Рекомендации по теме
Комментарии
Автор

Thanks for the video. At work I authenticate my login to their Microsoft software using a number generated by my Yubikey and my phone. This feels the same level as in your Alice scenario. At home I physically insert the key into my laptop; this feels more like your Bob scenario. Have I understood that right?

Grunfeld