Source |
Schneier on Security |
Identifiant |
4378460 |
Date de publication |
2022-04-01 11:12:27 (vue: 2022-04-01 12:06:00) |
Titre |
Bypassing Two-Factor Authentication |
Texte |
These techniques are not new, but they’re increasingly popular:
…some forms of MFA are stronger than others, and recent events show that these weaker forms aren’t much of a hurdle for some hackers to clear. In the past few months, suspected script kiddies like the Lapsus$ data extortion gang and elite Russian-state threat actors (like Cozy Bear, the group behind the SolarWinds hack) have both successfully defeated the protection.
[…]
Methods include:
Sending a bunch of MFA requests and hoping the target finally accepts one to make the noise stop.
... |
Notes |
|
Envoyé |
Oui |
Condensat |
…some accepts actors are aren’t authentication bear behind both bunch but bypassing clear cozy data defeated elite events extortion factor finally forms gang group hack hackers have hoping hurdle include: increasingly kiddies lapsus$ like make methods mfa months much new noise not one others past popular: protection recent requests russian script sending show solarwinds some state stop stronger successfully suspected target techniques than these they’re threat two weaker |
Tags |
Threat
|
Stories |
APT 29
|
Move |
|