No one needs to remind us of how exposed we are to cyber threats and how serious an issue this is for companies both big and small. Over the past few years, most experts have advised us that one of the most reliable ways to prevent these attacks is to implement security software that uses multi-factor identification, or MFA.
You’re probably familiar with MFA already. It’s when you try to log into a website with your password and it then requires you to use an additional form of authentication usually in the form of a special Personal Identification Number (PIN) sent to your smartphone. Even if a hacker steals your password it’s unlikely he’ll also have possession of your smartphone too, so MFA is really secure, right?
Well, maybe not as much as we think. Last month the FBI issued a warning to private companies about MFA. According to this ZDNet article by Catalin Cimpanu, the agency said that there is a rising threat of attacks against organizations and their employees which can bypass MFA solutions.
What kinds of threats? There are at least three that are the most popular.
The first is a SIM swap. That’s when the hacker steals enough information online about you that he can call up the phone company with this information, pretend to be you, and persuade them to re-route phone calls to a smartphone that he owns which contains a fresh SIM (Subscriber Identity Module) card that contains your details which he obtained via additional hacks, or purchased on the “dark” web. Once done, he then receives the text messages with the special MFA code and can access those accounts.
The second is through a website manipulation. If a website isn’t designed properly, a smart hacker can figure out how to circumvent the login pages where a PIN is required to arrive directly at an account holder’s details and then perform transactions.
The third is simply “social engineering” which is a nice way to describe when hackers fool users like you and me and our employees to give up information that we shouldn’t be. This may be accomplished by surreptitiously navigating us to “phishing” or fake websites where we offer vital information about ourselves or where cookies are downloaded with malicious code that are then used to automate a scam in the future by hijacking our online sessions where passwords and recovery emails are changed.
All of this is awful and annoying but there’s some good news: most security experts and even the FBI still recommend using MFA. Why? Because it’s not perfect, but for now it’s pretty darn close.
“Multi-factor authentication continues to be a strong and effective security measure to protect online accounts, as long as users take precautions to ensure they do not fall victim to these attacks,” the FBI said in the ZDNet report.
Even the big tech giants agree. Microsoft recently said that MFA attacks are “so out of the ordinary, that they don’t even have statistics on them” and Google’s research shows that “simply adding a recovery phone number to your Google Account can block up to 100% of automated bots, 99% of bulk phishing attacks, and 66% of targeted attacks that occurred during our investigation.”
The reason why these threats haven’t caught on so far is because they take too much work to accomplish by the hacker and can’t be automated on a mass scale. Sure, it may be worth it for a big fish but for most of us there’s more money to be made elsewhere with other less expensive forms of malware like ransomware.
But that’s just for now.
So go ahead and stick with MFA as your go-to security solution for all of your company’s applications and try to use strongest tools available (Cimpanu directs readers to this great summary of MFA solutions recommended by Microsoft). But don’t let your guard down. I’m betting, as hackers get smarter and figure out how to automate these attacks, MFA will become more and more susceptible.
The post The FBI Warns That Multi-Factor Authentication Is Not As Secure As You Think appeared first on Inc..