A MFA (Multi-Factor Authentication) reset attack is where a threat actor manipulates one of a few factors used to authenticate to a network. As a reminder, the strongest form of MFA is made up of the items below:
You can find out more about MFA in our previous article here.
The attacks that we are seeing are taking advantage of the ‘something you have' category. There has been an uplift in these attacks in recent months, as threat actors try and breach the perimeter of networks posing as a user that is legitimately authenticating.
Then as above Attack Path 2
Reviewing what MFA factors are being used by the business is another good form of mitigation, given the above attacks on the SMS OTP, many businesses may want to consider moving away from SMS as a factor.
Make sure the service desk team validate the identity of employees ahead of performing an MFA reset using thorough checks. If there is no service desk involved, an approval flow should be considered. Regular monitoring post MFA changes enables the organisation to spot unusual activity following an MFA reset.
Furthermore, using a corporate PAM (Privileged Access Management) tool for the governance of highly privileged accounts can help mitigate the risk of these accounts being compromised.
Our knowledge of the cyber risk landscape gives us a deeper understanding of the different types of cyber risk – whether it’s the physical damage exposure of a big industry or the high volume of patient records stored by a hospital.
Get in touch with our Cyber team to find out more.