Multi-factor authentication (MFA) has acquired the mantle of being one of the most common security best practices recommended to enterprises. However, while it is a useful first line of defense, the recent rash of successful identity-based attacks seen in 2022 has shown that implementing MFA alone does not make enterprises infallible.
In fact, the MFA system largely relies on human behavior and decision making – vectors that can open up enterprises to various paths of attack. Since MFA is only as strong as its weakest link, it depends on the cyber resilience of the individual using it.
This blog post discusses why MFA has become a common target for attack, the array of identity-based attacks in use today by attackers, and what the future of security for the identity surface looks like for enterprises going into 2023.
All forms of MFA share a common denominator – human users making decisions based on their own level of cybersecurity understanding. Threat actors capitalize on this element by employing social engineering tactics and malware to manipulate users into giving up their legitimate access.
MFA fatigue in particular has plagued enterprises in 2022. MFA fatigue works by flooding a user’s authentication app and device until they acquiesce to the deluge of push notifications. The attack path of this tactic usually follows these steps:
Other than overcoming the human element of the MFA system, the nature of how it is implemented also contributes to its fallibility. Security measures are only as effective as the scope of their implementation. Poorly-implemented MFA can be bypassed and anything less than 100% perfect implementation of MFA across all users of a system can be counted as a way in for opportunistic attackers.
Security researchers have identified numerous ways that MFA can be abused or bypassed, particularly when only a 2FA code is used, including
Exploiting the element of human involvement in MFA defenses, cyber attackers are starting to dodge MFA controls through a variety of techniques.
Despite the issues, it’s important to recognize that MFA is still an important part of a deeper defence strategy. Organizations that don’t deploy MFA are leaving the front door wide open.
Despite MFA being available for decades and highly recommended by cybersecurity experts, many small to medium businesses (SMBs) still have not made the move to require MFA from their employees and customers.
Efforts to implement MFA across a company can be susceptible to user resistance, with concerns that MFA might hinder how employees access their tools or may add more work for clients trying to access their data.
The following statistics from the Global Small Business MFA Study shed light on the levels of adoption in the SMB community today:
While MFA is no silver bullet for stopping identity-based cyberattacks, it is still capable of preventing a good number of account takeover attempts. To stay ahead of threat actors though, enterprises will need to implement additional levels of protection to augment their MFA technology.
After MFA-centric attacks have garnered such attention in the past few years, the U.S. government this year mandated all federal agencies to implement phishing-resistant MFA. This type of MFA leaves behind one-time passwords (OPTs), SMS text messages, and push notifications completely.
Instead, the MFA process is based on a FIDO2 (Fast Identity Online) network, allowing users to access their resources using fingerprints and cameras, for example. As FIDO2 authentication uses cryptographic login credentials unique to every website, they never leave the user’s device nor are they ever stored on a server. This model eliminates the risks of phishing as well as various forms of replay attacks and password theft.
Enterprises can also make their MFA less phishable by:
Outside of simply implementing MFA, the key to building a strong defense for the identity surface lies in recognizing the connection that links identity and security. Attacks reported in 2022 have shown the risks enterprises take when gaps in the identity protection strategy are left up to MFA alone.
While strong cybersecurity strategies include identity-based security tools such as identity and access management (IAM) and privileged access management (PAM), these are just the starting point of establishing identity-based protection in the long term.
Modern and innovative identity management tools will work in line with robust cybersecurity platforms like an Extended Detection and Response (XDR) to protect digital identities as well as the systems that manage them. A combination of both reduces the overall identity attack surface as it limits an enterprise’s exposure to attacks while constantly monitoring for signs of common and novel identity-based vectors.
To learn more, contact us today or request a demo.
Get a Demo of SentinelOne's Identity Suite
Bringing Identity to XDR. Ready to experience the market’s leading identity security suite?