X
NEXT
Forgot password?

Why Use Multi-Factor Authentication

In recent weeks we have observed an increase in the compromise of cloud based accounts followed by further malicious activity. In most cases, an organisation has the technology and processes in place to prevent this type of compromise. However, for the unequipped the impact can be catastrophic to organisations of all sizes.

Many organisations that outsource email, collaboration and content services to the cloud (e.g. Office365) are not equipped to detect these types of attacks. Benefits of outsourcing to cloud providers (amongst others) are reduced operational costs and ease of use, terms that are not usually associated with the deployment of protective security measures. Because of this, organisations are not able to detect the phases of an attack of this nature until real word effects are experienced.

In this article we will look at the phases of an attack of this nature, the steps an adversary takes to ensure success; and mitigation that organisations can put in place to prevent falling victim to this ever increasing threat.

Attack Phases

Reconnaissance

Summary

During the reconnaissance phase of this type of attack, the adversary uses open source information gathering techniques to harvest email addresses and contact details for key members of staff of the target organisation. Any additional information or content that an attacker can gather during this phase aids in making a spear phishing email more convincing. Content such as a convincing email signature or a look-a-like domain makes the target user more likely to fall into the adversary’s trap.

Mitigation

Mitigating this phase of an attack can prove difficult. Services and communications channels that an organisation utilises for sales, marketing, advertising and brand awareness are commonly used by an adversary to conduct information gathering. Limiting the information freely available on the internet may be difficult, but efforts must be made to ensure that no sensitive information or contact details are not in the public domain.

Weaponisation

Summary

The adversary will create a convincing looking webpage, mimicking the look and feel of a legitimate cloud service provider. Similar looking domains and graphics do not raise the suspicion of the target. Login pages will look convincing, but rather than logging in to the cloud service provider, credentials (usernames & passwords) will be sent to a staging area set up by the adversary.

Mitigation

Mitigation at this phase of the attack is not possible due to not being an interactive engagement between the adversary and the target organisation.

Delivery

Summary

Once reconnaissance has been completed and a legitimate looking phishing site has been created, the adversary is ready to send the malicious email. Using the information gathered during the reconnaissance phase, the adversary crafts an email to look as legitimate as possible using brand artefacts (colour scheme, font, graphics and content) that will be sent to the target employee. The email entice the user to follow a link to the phishing site under the guise of an urgent account change, pending payment or more ironically to check account security settings.

Mitigation

Mitigating this phase of an attack prevents the successful delivery of the phishing email to the target organisation. The following protective measures can be applied to help mitigate this phase:

  • Implement Domain-based Message Authentication, Reporting & Conformance (DMARC) to improve and monitor protection of the organisations domain from fraudulent email.
  • Ensure all staff members receive IT security awareness training and are aware of the common ways to spot a malicious email.

Exploit

Summary

While not an exploit in the most common sense, the exploit phase of this attack scenario would be the successful harvesting of the target users credentials through the phishing webpage. Once the target user enters their credentials into the phishing page, they are transmitted to the adversary’s staging server and recorded for later use. It is not uncommon for target users to be forwarded to the legitimate login page of the service provider after entering credentials on a phishing page, this technique suppresses any suspicions of the target user.

Mitigation

Mitigation at this phase of the attack prevents the target user from visiting the phishing site and subsequently giving up credentials to the adversary. Training users to spot a suspicious email and being able to spot an illegitimate website is crucial to mitigating this phase of the attack. Utilising multi-factor authentication on cloud services can immediately mitigate the effects of this phase, even if the credential harvesting is successful. In the event that an adversary attempts to use the credentials of a multi-factor authentication enabled account they will also require the one time passphrase generated at login. One time passphrases are commonly communicated via SMS or via mobile applications, both of which an adversary would not have access to unless part of a very complex and planned attack.

Actions

Summary

Once an adversary has successfully harvested the credentials of a target employee, they have unfettered access to the features of and information stored within the cloud service tenancy. Further activities can include (but are not limited to):

  • Theft of information (trade secrets, financial information, credentials, contacts etc.)
  • Attack pivoting to further compromise the target organisation.
  • Attack pivoting to compromise other organisations.
  • Use of resources belonging to the target organisation for financial, competitive or other motivation.

Mitigation

Although the list of actions above are not exhaustive, there are a number of basic steps that can be taken by an organisation, regardless of size, to limit the effectiveness of phishing attacks and credential harvesting:

  • Enforce security awareness training across all employees. An employee that is trained in how to spot a phishing email is less likely to fall victim to one.
  • Enforce multi-factor authentication across all cloud services and internet accessible applications.
  • Deploy protective measures to prevent the receipt of malicious email, web filtering to prevent the delivery of web based malicious payloads and detection mechanisms that will alert the organisation of an attempted attack.

So what is multi-factor authentication?

Multi-factor authentication is a mechanism that adds another layer of security over the legacy username and password approach. When a user logs in to a system that has multi-factor authentication enabled, they are first prompted for their username and password and once successful are then prompted for another form of authentication.

The most common and widely used form of multi-factor authentication is One Time Password/Pin (OTP). When using this form of multi-factor authentication, a user is provided with a one time password that is delivered via text message (SMS), email or via a specific mobile application.

This form of authentication requires the person logging in to be in possession of the credentials (something you know) and the multi-factor authentication mechanism (something you have). In the event that an attacker has compromised the credentials of a user, they still require the second authentication mechanism to access the user’s account.

Other forms of multifactor authentication are available, but will not be discussed at length in this article. Examples include:

  • Biometric (fingerprint, iris, voice)
  • Smartcard
  • Security Key (physical hardware)

Summary

To summarise, multi-factor authentication is a protection mechanism that any organisation should be able to implement and is a critical security measure when it comes to preventing unauthorised access to systems and applications.

Although employing this type of security measure does not make an application or system impenetrable, it drastically increases the chances of mitigating an attack on user credentials. As described earlier in the article, for an adversary to gain access to an application or system using stolen credentials they will also require the second authentication mechanism to ensure a successful compromise.

Most major application and software-as-a-service (SaaS) vendors offer multifactor support in different forms. Selecting a multifactor authentication method is a business decision and multiple considerations need to be made such as cost, convenience and overall acceptance by the user base.

Cyber Security Experts

Accredited and regulated, we're in the top 1% of cyber security agencies globally

Crown Commercial Service Supplier Cyber Essentials Plus ISO 27001 BSI ISO 9001 CHECK NCSC Cyber Incident Response CREST

We’re trusted by the UK Government as Crown Commercial Service providers as well as being accredited by two of the leading cyber security governing bodies. Our ISO9001 certification means you can rest assured our processes and approach are market leading.

Protect Your Business & Your Reputation.

With a continued focus on security, you can rest assured that breaches and exploits won't be holding you back.

Speak To An Expert

x

Get In Touch

[contact-form-7 id="5" title="Contact Us Form"]