Page 108 - Cyber Defense eMagazine Annual RSA Edition for 2024
P. 108

Avoiding Prompt Bombing Scam with Phishing



            Resistant MFA

            Authentication threat targets Apple users with repetitive password reset notifications.

            By Bojan Simic, Co-founder, CEO and CTO at HYPR



            Recently, we learned about an aggressive phishing attack targeting Apple users, employing MFA prompt
            bombing to exploit a suspected vulnerability in Apple's password reset feature. This method isn’t novel,
            as it’s been previously blamed for attacks on Uber, Cisco and others.

            How does this happen? MFA prompt attacks rely on the human phenomenon of MFA fatigue. People
            typically  log  into  many  applications,  systems,  and  services  each  day  using  multiple  authentication
            methods. Many MFA providers grant access by accepting a phone app push notification or receiving a
            phone call and pressing a key as a second factor. For example, Uber used push notifications through an
            authenticator app. An attacker can usually issue multiple push notifications or keep calling until their
            request is finally accepted. Add in some socially engineered interactions, and it's inevitable that some
            users will approve a non-legitimate login request.

            In this situation, the user experienced MFA prompt bombing - an approach by attackers to overload users
            with  notifications.  It  relies  on  the  repeated  pressure  of  these  notifications  to  wear  down  a  person’s
            patience until they finally click "Allow,” and unwittingly provide the attacker with the authentication code
            needed to access the user’s account.





                                                                                                            108
   103   104   105   106   107   108   109   110   111   112   113