Can your MFA implementations stymie MFA bypass attacks? - Help Net Security

Can your MFA implementations stymie MFA bypass attacks? - Help Net Security

Shay Nahari, Head of Red-Team services at CyberArk, says that they’ve been increasingly asked by customers to probe their multi-factor authentication (MFA) defenses, which lead them to pinpoint four main attack vectors used by threat actors to circumvent MFA controls, by exploiting: architectural and design flaws, insecure channels, side channel attacks and insufficient attack surface coverage.



Why MFA is a good choice


The cybersecurity industry has been extolling the virtues of MFA use for years.


According to Microsoft, using any kind of MFA “significantly increases the costs for attackers, which is why the rate of compromise of accounts using any type of MFA is less than 0.1% of the general population.”


Attackers are always on the lookout for ways to ..

Support the originator by clicking the read the rest link below.