Blog

How cybercriminals bypass MFA and what you can do about it

How cybercriminals bypass MFA and what you can do about it

Do you feel more secure knowing that you have multifactor authentication (MFA) in place? While MFA is a powerful security measure, it’s important to realize that it’s not infallible. In this article, we’ll explore the ways MFA can be compromised and provide practical tips to protect your organization.

How cybercriminals bypass MFA

Cybercriminals use a variety of techniques to compromise MFA systems. 

MFA fatigue

MFA fatigue, also known as push bombing, occurs when cybercriminals flood users with numerous authentication requests, often through push notifications. Overwhelmed by the constant bombardment, users may accidentally or out of frustration approve one of the requests, unwittingly giving cybercriminals access. A notable example of this occurred in 2022 when cybercriminals targeted Uber’s external contractor, repeatedly sending MFA requests until access was granted.

Phishing

In a phishing attack, cybercriminals pose as legitimate entities such as banks or IT support, and send deceptive messages that prompt users to provide their MFA codes. These messages often contain a sense of urgency such as a warning of an account breach or a required security update to pressure users into acting without verifying the authenticity of the request. Once the cybercriminals have the MFA code, they can use it to bypass security systems and gain unauthorized access to accounts or sensitive data.

SIM swapping

Mobile devices are often used as a primary means of receiving MFA codes, making them a prime target for cybercriminals. In a SIM swapping attack, a cybercriminal convinces a mobile carrier to transfer a victim’s phone number to a new SIM card that they control. Once successful, the cybercriminal intercepts MFA codes sent via SMS, allowing unauthorized access to the victim’s accounts.

Strategies to prevent MFA attacks

To protect your organization from MFA hacks, follow these strategies:

Use risk-based authentication

Implement risk-based authentication that dynamically adjusts security requirements based on user behavior. For example, if a user logs in from an unusual location or unknown device, the system can automatically require additional verification. This adaptive approach helps prevent attacks by raising security standards when necessary.

Implement hardware-based MFA

Hardware security keys such as those that use Fast Identity Online (FIDO) protocols, provide stronger protection than software-based MFA. These physical devices generate unique authentication codes, making them much harder to intercept or duplicate. Consider using hardware-based MFA for highly sensitive applications to enhance your security posture.

Regularly review access rights

Grant users only the access they need. Regularly audit user permissions to ensure employees have access only to the data and systems necessary for their roles. This limits the potential damage a compromised account can cause, reducing the overall risk to your business.

Strengthen password reset processes

Password reset procedures can be a weak link in MFA systems. Make sure your reset processes require users to verify their identity through more than one channel. This additional layer of security can prevent cybercriminals from exploiting reset processes to gain unauthorized access.

Monitor high-value targets

Certain users, such as system administrators and legal or HR personnel, possess elevated privileges that make them attractive to attackers. Pay close attention to the MFA protections surrounding these accounts and implement the strictest security measures.

Stay ahead of emerging threats

Cybercriminals are constantly evolving their tactics. To ensure your systems remain resilient, keep a close eye on new attack methods and vulnerabilities, and proactively update your security measures to counter these threats. Implementing these strategies can help you significantly bolster your company’s defenses against MFA attacks and safeguard valuable assets from unauthorized access. 

Get in touch with the Beringer Team today!

At Beringer Technology Group our team is dedicated to providing comprehensive support for our customers. Whether for cybersecurity, network, application or device support, the Beringer team is here to help!

Beringer Technology Group, a Microsoft Solutions Partner for Business Applications, specializing in Microsoft Dynamics 365 and CRM for Distribution also provides expert Managed IT ServicesBackup and Disaster RecoveryCloud Based Computing, Email Security Implementation and TrainingUnified Communication Solutions, and Cybersecurity Risk Assessments.