New Multi-Factor Authentication Prompt “Bombing” Attacks Give Access to Laptops, VPNs, and More

New Multi-Factor Authentication PromptWhile multi-factor authentication (MFA) significantly reduces an organization’s threat surface by making the stealing of credentials much harder, a new attack takes advantage of phone calls as the second factor.

Whenever cybercriminals can successfully leverage the victim themselves as part of an attack, they will. And that appears to be the case in a new attack by cybercriminal group Lapsus$. In this new attack, first detailed by Wired, Lapsus$ has taken advantage of various platform’s MFA implementation that uses either a phone call or pushing a button on the screen of their mobile phone.

The attack method is rather simple – call the victim employee a multitude of times at 1am when they’re sleeping, and - according to Lapsus$ on their official Telegram channel – [the victim employee] “will more than likely accept it. Once the employee accepts the initial call, you can access the MFA enrollment portal and enroll another device.”

According to reports, Lapsus$ has successfully used MFA prompt bombing against Microsoft to gain access to the internal Microsoft network via an employee’s VPN.

Users of MFA need to be made aware of these types of techniques via Security Awareness Training to group this kind of unexpected prompting in with phishing emails, social engineering scams on social media, etc. – anytime they interact with something that provides access that they were not expecting to see should be considered suspicious.

12 Ways to Defeat Multi-Factor Authentication On-Demand Webinar

Webinars19Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, explores 12 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. Plus, he shares a hacking demo by KnowBe4's Chief Hacking Officer, Kevin Mitnick.

Watch the Webinar

PS: Don't like to click on redirected buttons? Cut & Paste this link in your browser:

Topics: MFA

Subscribe to Our Blog

Comprehensive Anti-Phishing Guide

Get the latest about social engineering

Subscribe to CyberheistNews