Multi-Factor Authentication (MFA) is commonly used to protect your information online. However, MFA is not impenetrable from Social Engineering
If a password is compromised, hackers can deploy several tactics to get around any MFA protection.
The information in this blog has been sourced using The Hackers News. You can read the full story here
Adversary-in-the-middle (AITM) attacks from Social Engineering
An AITM attack involves “deceiving users into believing they’re logging into a genuine network, application, or website.”
Through this hack, people can unwittingly give information to Cybercriminals.
An example of this is a spear-phishing email that arrives in an employee’s inbox.
MFA prompt bombing
This attack involves push notifications in modern authentication apps. After hackers access a password, attackers try to use the password to trigger the MFA prompt for the compromised account.
If the user inputs their details into the MFA prompt, the hackers will gain full access to the account.
Service desk attacks from Social Engineering
Hackers access helpdesks by “feigning password forgetfulness and gaining access through phone calls.”
If the proper verification checks aren’t in place, hackers may be granted access to an organisational environment.
Another way is to “exploit recovery settings and backup procedures by manipulating service desks to circumvent MFA.”
An example of this is when hackers contact a service desk claiming their phone is not functioning or is lost, then request a new account which is controlled by an attacker-controlled MFA authentication device. This will allow the hackers to gain control.
SIM swapping
This technique involves Cybercriminals deceiving “service providers into transferring a target’s services to a SIM card under their control.”
The hackers can then effectively take over the target’s mobile phone service and phone number, letting them intercept MFA prompts and gain full access to accounts.
In an era where financial fraud is on the rise, UK businesses are increasingly finding themselves targeted by cybercriminals deploying sophisticated scams. The financial
The UK government is ramping up efforts to strengthen national cyber defences with the introduction of the Cyber Security and Resilience Bill. This legislation
In the ever-evolving world of cybersecurity, AI is no longer just a tool for defense—it’s now being weaponised by cybercriminals to launch more sophisticated
The rapid pace of digital transformation has made it increasingly challenging for small and medium-sized businesses (SMBs) to keep up with evolving technology needs.
4th Platform is proud to support LegalAI in transforming the legal industry with cutting-edge AI solutions. One of LegalAI’s latest successes is its partnership
The UK’s IT industry is experiencing an unprecedented skills gap, with businesses struggling to find qualified professionals to fill critical roles. As technology continues
Data Privacy Day is more than just a date on the calendar—it’s a global reminder of the critical importance of safeguarding data in today’s
What a year for technology 2024 has been! As we step into 2025, the pace of innovation shows no signs of slowing down. From
In the rapidly evolving digital landscape, data protection remains a critical focus for businesses operating in the UK. Post-Brexit, the UK’s data protection framework
In today’s digital landscape, the consequences of non-compliance in IT security are severe and far-reaching. Organisations that fail to meet established security standards not