Transcript
Rick Howard (0:02)
You're listening to the Cyberwire Network powered by N2K.
Peter Kilpe (0:11)
Most environments trust far more than they should, and attackers know it. ThreatLocker solves that by enforcing default deny at the point of execution. With ThreatLocker allow listing, you stop unknown executables cold. With ring Fencing, you control how trusted applications behave, and with threatlocker DAC defense against configurations, you get real assurance that your environment is free of misconfigurations and clear visibility into whether you meet compliance standards. ThreatLocker is the simplest way to enforce zero trust principles without the operational pain. It's powerful protection that gives CISOs real visibility, real control, and real peace of mind. ThreatLocker makes zero trust attainable even for small security teams. See why thousands of organizations choose Threat Locker to minimize alert fatigue, stop ransomware at the source, and regain control over their environments. Schedule your demo@threatlocker.com N2K today.
Tim Nodar (1:23)
The word is MFA prompt bombing, Spelled M for multi, F for factor, A for authentication prompt, as in a Multi Factor Authentication notification, and bombing, as in sending repeated MFA prompts to a user's device. Hackers bypass multi factor authentication schemes by sending a blizzard of spamming login attempts until the account's owner accepts the MFA prompt out of desperation to make the spamming stop. Example sentence in the middle of the night, the victim, after receiving hundreds of MFA prompts on his phone, validated access to his account and went back to bed. Origin and Context this hacking technique takes advantage of the fact that we all hate to be annoyed and inconvenienced. After an attacker steals a victim's username and password, they repeatedly attempt to log in as the victim, which sends a Multi Factor Authentication request to the victim's second factor, usually his mobile device. Users who aren't paying attention get frustrated with the volume of authentication requests and just to make it go away, they approve it. They might assume it's just an error, or maybe an IT employee at their company trying to log into their account. Regardless, they can't be bothered and accept the request. Dan Gooding at Ars Technica quotes a member of the Lapsus cybercrime group as saying, no limit is placed on the amount of calls that can be made. Call the employee 100 times at 1am or while he's trying to sleep, and he will more than likely accept it. Once the employee accepts the initial call, you can access the MFA enrollment portal and enroll another device. Nation state actors have also been observed using this technique. Researchers at Mandia note that the Russian threat actor APT29 also known as Cozy Bear, has successfully used MFA prompt bombing in its own campaign. Nerd reference. The 1992 movie Sneakers, one of the all time great hacker movies, has the perfect scene that demonstrates real life MFA prompt bombing. By the way, the movie was written by the guys who wrote another all time great hacker movie, War Games. Lawrence Lasker and Walter Parks in this scene. Robert Redford, probably best known to this audience for Endgame and Captain Winter Soldier and River Phoenix, probably best known for Indiana Jones and the Last Crusade he played the young Indiana Jones, are trying to get past a security guard and an electronic lock. Two factors. The scene opens with River Phoenix dressed as a delivery man standing in front of the security guard with a stack of Drano boxes, claiming that he has a work order to deliver them to the top floor. The security guard doesn't have him on the access list and is having none of it. The two get into a heated argument. That's when Redford walks up to the counter with some lame story about his wife delivering the birthday cake and the balloons.
![MFA prompt bombing (noun) [Word Notes] - Hacking Humans cover](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2F2ad260f8-effe-11f0-90a2-97ff9ea3c64d%2Fimage%2F441b0ca2db080b93b935568d381ce462.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=1920&q=75)