Simply Smart Now Part of LeadingIT Learn more
Our knowledgeable team will support you organization, allowing your staff to get the most out of your technology.
We implement layers of protection to ensure your organization is secure.
Using best practices, we proactively protect your organization from becoming a victim of cybercrime.
As a Datto Blue Diamond Partner we secure your data with industry leading backup and disaster recovery solutions.
We are committed to offering you the right technology that works for your business.
LeadingIT understands the technology needs of your business and offers computer, network and cybersecurity support to help you get the most out of your technology.
Read why businesses small and large across Wisconsin, Illinois and Indiana choose LeadingIT.
Working at LeadingIT means joining a group of people obsessed with taking on the real challenge of cybersecurity and helping businesses.
Stay up to date on the latest security threats your business faces and get tips on how to stay protected and informed.
Multi-factor authentication (MFA) is being implemented by many businesses to improve their security, but hackers are constantly developing new methods of bypassing this measure. Despite the widespread adoption of MFA, hackers have returned their focus to the process’s weakest link—the human element—developing novel social engineering-based intrusion strategies.
One of the most compelling examples of how not all MFA solutions are secure is the practice of “prompt bombing,” which involves a user repeatedly clicking on an MFA prompt, leading to users getting multiple authentication requests. This social engineering tactic has recently gained a lot of attention due to its successful deployment by cybercriminal groups. Read on to learn more.
According to new information revealed by Uber, the Lapsus$ hacking organization was responsible for the large breach that occurred at Uber this month (September 2022). Experts say the incident shows the dangers of putting too much faith in multi-factor authentication and the unmanaged risks associated with cloud services.
With the same tactic, Lapsus$ hackers allegedly stole 37GB of source code for Bing, Cortana, and other projects from Microsoft’s internal Azure DevOps server and released it to the public in March 2022.
In early 2021, also using MFA prompt bombing, a hacker known as APT 29 infiltrated SolarWinds’ build infrastructure for its Orion network monitoring software, allowing it to spread a backdoor to 18,000 clients in the public and private sectors.
All of these attacks bypassed MFA because they tricked users into thinking they were acknowledging an MFA request.
Strategies for MFA bombing include:
With these strategies in mind, it’s vital to acknowledge multiple, unintentional requests because it’s a sign that something isn’t right.
MFA is a popular means of securing networks and individual accounts, but it’s not immune to cyber-attacks. Therefore, organizations must thoroughly vet their MFA solutions to minimize this threat. Most importantly, do NOT ignore multiple unintentional requests. It means that something isn’t right and that the business is at risk of a cyber-attack by means of MFA prompt bombing.
LeadingIT offers 24/7, all-inclusive, fast and friendly technology and cybersecurity support for nonprofits, manufacturers, schools, accounting firms, religious organizations, government, and law offices with 20-200 employees across the Chicagoland area.
©2023 LeadingIT. All Rights Reserved.