This is the second blog in a two-part series about Multi-Factor Authentication (MFA) security. In the first blog, we defined MFA and outlined various methods attackers use to bypass MFA. This blog will focus on why adversary-in-the-middle techniques are growing and give organizations actionable ways to prevent MFA bypass.
As organizations implement MFA universally, attackers are forced to develop methods that exploit implementation gaps or human behavior rather than cracking authentication protocols directly.
With the shift to remote working, this expanded the attack surfaces as organizations rushed to implement remote working solutions, thus CAP exemptions and reliance on cloud services became an easy solution.
Therefore, adversary-in-the-middle attacks have become increasingly popular due to the widespread adoption of MFA, shift to less robust CAPs due to the speedy shift to remote working, and the availability of accessible, open-source tools like Modlishka and Evilginx.
So, while MFA has become more popular, strengthening security postures, the attack surface has increased as well as tool availability, lowering the barrier for less sophisticated attackers to launch advanced attacks.
To mitigate the risks of MFA bypass, organizations need to take a multi-pronged approach that combines technology, processes, and people. A robust policy enforcement, advanced authentication methods, and proactive monitoring.
There are many more things organizations can do that range from strengthening device and endpoint security, to enhancing threat hunting and incident response. MFA providers are moving towards innovative authentication methods and leveraging behavioral risk-based analysis but organizations must also work towards proactive strategies. Adopting a zero-trust approach as well as encouraging partnership with the hacker community through vulnerability disclosure programs can help pave the way to dealing with this very broad and increasingly complex topic.