CISO Tradecraft® artwork

#169 - MFA Mishaps

CISO Tradecraft®

English - February 19, 2024 11:00 - 33 minutes - 30.5 MB - ★★★★★ - 46 ratings
Technology Homepage Download Apple Podcasts Google Podcasts Overcast Castro Pocket Casts RSS feed


In this episode of CISO Tradecraft, host G Mark Hardy discusses various mishaps that can occur with Multi-Factor Authentication (MFA) and how these can be exploited by attackers. The talk covers several scenarios such as the misuse of test servers, bypassing of MFA via malicious apps and phishing scams, violation of the Illinois Biometric Information Protection Act by using biometric data without proper consent, and potential future legal restrictions on biometric data usage. G Mark also highlights the significance of correct implementation of MFA to ensure optimum organizational security and how companies can fail to achieve this due to overlooking non-technical issues like legal consent for biometric data collection.


Transcripts: https://docs.google.com/document/d/1FPCFlFRV1S_5eaFmjp5ByU-FCAzg_1kO


References:


Evil Proxy Attack- https://www.resecurity.com/blog/article/evilproxy-phishing-as-a-service-with-mfa-bypass-emerged-in-dark-web
Microsoft Attack - https://www-bleepingcomputer-com.cdn.ampproject.org/c/s/www.bleepingcomputer.com/news/security/microsoft-reveals-how-hackers-breached-its-exchange-online-accounts/amp/
Illinois Biometric Law - https://www.ilga.gov/legislation/publicacts/fulltext.asp?Name=095-0994

Chapters


00:00 Introduction
00:43 Understanding Multi Factor Authentication
01:05 Exploring Different Levels of Authentication
03:30 The Risks of Multi Factor Authentication
03:51 The Importance of Password Management
04:27 Exploring the Use of Trusted Platform Module for Authentication
06:17 Understanding the Difference Between TPM and HSM
09:00 The Challenges of Implementing MFA in Enterprises
11:25 Exploring Real-World MFA Mishaps
15:30 The Risks of Overprivileged Test Systems
17:16 The Importance of Monitoring Non-Production Environments
19:02 Understanding Consent Phishing Scams
30:37 The Legal Implications of Biometric Data Collection
32:24 Conclusion and Final Thoughts