Increasingly organizations are becoming victims of phishing campaigns designed to bypass Multi-Factor Authentication (MFA) in Microsoft 365, Google, Adobe, Docusign, and other secure services. Sophisticated techniques have become increasingly easy and common for cybercriminals to acquire and deploy. These new MFA bypass capabilities are limiting the effectiveness of Multi-Factor Authentication and requiring users to re-emphasize their basic phishing and security awareness training to be able to spot phishing and suspicious emails.
The simplest explanation for how MFA is being bypassed on these secure platforms is that cybercriminals are using proxy servers and middleware to not only capture phished credentials from unsuspecting users, but also to piggy-back the MFA data the user sends to authenticate the bad actor into the secure account. Once the bad actor has gained access to the compromised user session, they add additional MFA devices to the now compromised account to authenticate themselves back in at any future time.
MFA is still a good defense against password and phishing compromises, but the same mistaken user action of clicking a compromised link in an email or website and providing their secure account credentials (being phished), may now also result in them providing MFA authentication for the bad actor into their secured account.
When only account credentials are compromised, and the user is not actively involved in the login attempt to provide their MFA authentication, then MFA protection will likely still hold as a layer of defense to prevent unauthorized account access. So, MFA is still an effective layer of defense for securing accounts.
With MFA not the holistic solution many users hoped for, organizations need to fallback to some more reliable security solutions while considering the possibility of some more restrictive actions which could help harden MFA but might have unintended consequences.
When enabling additional restrictive policies, such as Conditional Access, there may be unintended consequences, such as blocking legitimate sign-in requests and inconvenience to users.
At Server At Work, we recognize that your up-time is why you need us. Our processes are designed to limit your downtime while we respond quickly to technical support issues.
Schedule a Call