Data Breach News

Multi Factor Authentication Not Enough!

The upcoming Special Publication (SP) 800-171 revisions by the NIST will provide the next Cybersecurity Maturity Model Certification (CMMC).

by Ashish Khaitan

Last updated on December 26th, 2022

Share on LinkedInShare on Twitter

New technologies and great minds have cracked the code to bypass MFA, which is taking a toll on worldwide authorities in cybersecurity.

The Defense Industrial Base (DIB) is moving into its next security phase with a new initiative. Companies must find better security measures because Cybersecurity Maturity Model Certification (CMMC) will soon intervene in their contracts.  

The upcoming Special Publication (SP) 800-171 revisions by the National Institute of Standards and Technology (NIST) will provide the next Cybersecurity Maturity Model Certification (CMMC).

It will include extra precautions and protocols for going the extra mile over the MFA. Organizations that hold data, and several data points, connecting to Controlled Unclassified Information (CUI) would need to swot up some new techniques since MFA is failing at providing security and meeting the new CMMC criteria. 

Why is Multi Factor Authentication failing? 

Multi Factor Authentication (MFA) is a security process requiring users to provide more than one authentication method when logging into a system or accessing sensitive data.

This can help prevent unauthorized access and increase the system’s security or data. While MFA can undoubtedly help increase a system’s security or application, it is crucial to recognize that there are more complete solutions.  

Social engineering  

While MFA adds a layer of security, it is still possible for attackers to bypass it. For example, an attacker could use social engineering techniques to trick a user into giving away their password or security token. Or, an attacker could use a phishing attack to steal a user’s login credentials. 

Card swapping 

Some forms of MFA, such as SMS-based authentication or security tokens, can defeat attackers with the right tools and expertise. For example, an attacker could use a SIM card swap attack to intercept SMS messages and gain access to a user’s account. 

Supply chain attacks 

Supply chain attacks can be hazardous because they can allow attackers to compromise the security of a system or data without having to target the system or data itself directly. By compromising the methods or processes used to provide MFA services, attackers can gain access to sensitive data or systems without hacking into them. 

MFA-bombing  

MFA-bombing or Multi Factor Authentication bombing can be particularly effective against systems that use weak or easily guessable MFA credentials, such as simple PINs or security questions.

They can also be effective against systems that do not have proper controls to prevent repeated login attempts or that do not lock out accounts after a certain number of failed login attempts. 

Conclusion  

While MFA is an important security measure, there are more complete solutions. It is important to use MFA in conjunction with other security measures, such as strong passwords, to ensure the overall security of a system or application.

However, with the way the hacking world is innovating techniques to breach systems, MFA may no longer be the only way to add an extra layer of protection to secure data. 

Source

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button