Multi-Factor Authentication (MFA) is commonly used to protect your information online. However, MFA is not impenetrable from Social Engineering
If a password is compromised, hackers can deploy several tactics to get around any MFA protection.
The information in this blog has been sourced using The Hackers News. You can read the full story here
Adversary-in-the-middle (AITM) attacks from Social Engineering
An AITM attack involves “deceiving users into believing they’re logging into a genuine network, application, or website.”
Through this hack, people can unwittingly give information to Cybercriminals.
An example of this is a spear-phishing email that arrives in an employee’s inbox.
MFA prompt bombing
This attack involves push notifications in modern authentication apps. After hackers access a password, attackers try to use the password to trigger the MFA prompt for the compromised account.
If the user inputs their details into the MFA prompt, the hackers will gain full access to the account.
Service desk attacks from Social Engineering
Hackers access helpdesks by “feigning password forgetfulness and gaining access through phone calls.”
If the proper verification checks aren’t in place, hackers may be granted access to an organisational environment.
Another way is to “exploit recovery settings and backup procedures by manipulating service desks to circumvent MFA.”
An example of this is when hackers contact a service desk claiming their phone is not functioning or is lost, then request a new account which is controlled by an attacker-controlled MFA authentication device. This will allow the hackers to gain control.
SIM swapping
This technique involves Cybercriminals deceiving “service providers into transferring a target’s services to a SIM card under their control.”
The hackers can then effectively take over the target’s mobile phone service and phone number, letting them intercept MFA prompts and gain full access to accounts.
Despite increased awareness of cyber threats across the legal sector, law firms continue to be prime targets for cybercriminals. These attacks are no longer
In today’s fast-paced business environment, technology is the backbone of productivity. When IT systems run smoothly, employees can focus on their tasks without unnecessary
When we think about cybersecurity threats, external hackers and cybercriminals often come to mind. However, some of the most significant risks come from within
In an era where financial fraud is on the rise, UK businesses are increasingly finding themselves targeted by cybercriminals deploying sophisticated scams. The financial
The UK government is ramping up efforts to strengthen national cyber defences with the introduction of the Cyber Security and Resilience Bill. This legislation
In the ever-evolving world of cybersecurity, AI is no longer just a tool for defense—it’s now being weaponised by cybercriminals to launch more sophisticated
The rapid pace of digital transformation has made it increasingly challenging for small and medium-sized businesses (SMBs) to keep up with evolving technology needs.
4th Platform is proud to support LegalAI in transforming the legal industry with cutting-edge AI solutions. One of LegalAI’s latest successes is its partnership
The UK’s IT industry is experiencing an unprecedented skills gap, with businesses struggling to find qualified professionals to fill critical roles. As technology continues
Data Privacy Day is more than just a date on the calendar—it’s a global reminder of the critical importance of safeguarding data in today’s