Transcript
A (0:02)
You're listening to the Cyberwire network, powered by N2K.
B (0:09)
This is pro linebacker TJ Watt and I'm back with YPB by Abercrombie for another activewear drop. My second co design collection has new shorts and tanks that keep up with all my in season workouts and their new Restore collection is a game changer off the field too, because even pro athletes like me need rest days. Shop YPB by Abercrombie in the app, online and in stores, because your personal best is greater than anything.
C (0:45)
Hello everyone and welcome to the Cyberwires Research Saturday. I'm Dave Bittner and this is our weekly conversation with researchers and analysts tracking down the threats and vulnerabilities, solving some of the hard problems, and protecting ourselves in our rapidly evolving cyberspace. Thanks for joining us.
A (1:10)
In this particular campaign, it was pretty interesting because the threat actors will impersonate various fake Microsoft OAuth applications and ultimately lead to credential theft.
C (1:21)
That's Selina Larson, staff Threat Researcher and Lead for Intelligence analysis and strategy at Proofpoint. The research we're discussing today is titled Microsoft OAuth App Impersonation Campaign Leads to MFA Phishing.
A (1:43)
So sometimes we see Microsoft OAuth app impersonation trying to gain access via the malicious app, various permissions and stuff, but in this case it was used more as a vehicle to enable the credential phishing, which was pretty interesting.
C (1:57)
Well, let's back up just a step and can you describe for us what exactly we're talking about when we say MFA phishing?
A (2:04)
Of course. So MFA phishing is Multi Factor Authentication phishing. So typically historically, people will have a username and password to log into things. And adding a layer of Multi Factor Authentication could be anything from an SMS to a token that you have to a Yubikey or something like a physical token that you log in, or even your fingerprint or your face id, things like that. So adding multiple multifactor authentication to every login adds a layer of protection to organizations. And to keep your information secure, you should enable MFA everywhere on everything. But because we as an information security ecosystem have gotten so much better at mandating multi factor authentication and having that second factor to go along with our username and passwords, threat actors have had to get pretty creative and come up with tools and resources to be able to bypass that. So effectively what they're doing is not just stealing your username and password anymore, but also your authentication token or whatever that additional login would be for getting into your account. So there are a variety of ways that they do this. But there are multi factor authentication phish kits that are out there that essentially provide threat actors with that easy way of bypassing the mfa, if it's a certain type of MFA and if your account has it.
