Cyber Affairs
No Result
View All Result
  • Login
  • Register
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers
Home Cyber Intelligence

Infostealer Malware Threat Grows as MFA Fatigue Attacks Spread 

admin by admin
Dec 22, 2022
in Cyber Intelligence
0 0
A A
0
FacebookTwitterLinkedIn

Information stealer malware flourished on underground criminal networks in 2022, along with a rise in multifactor authentication (MFA) fatigue attacks, according to research from Accenture’s Cyber Threat Intelligence team.

Infostealers are malicious software packages designed to steal victims’ information, including their passwords.

In MFA fatigue, an attacker floods an end user’s MFA device, typically a phone, with notifications to approve a login attempt. The intent is to tire the end-user out so they finally approve a login request to make the notifications stop.

The report found cybercriminals have stepped up offerings of infostealer malware variants to take advantage of demand, noting a rise of compromised credential marketplaces and a shift toward private sales for quality logs.

More Lucrative Than Ransomware

Timothy Morris, chief security advisor at Tanium, said he thinks infostealer malware may be flourishing because extortion is thriving, and extortion is more lucrative and simpler than ransomware.

“Most people think of extortion as holding data of an enterprise hostage or threats of leaking the stolen data during or after a ransomware attack—that is typical second-level extortion,” he explained. “The third level are the threats to leak the data of the individuals or entities contained within the data that has been exfiltrated.”

He added that this third layer of extortion can be arrived at by simply stealing the information, which infostealer malware is good—and mature—at doing.

“The same skills and infrastructure used to write and operate a banking trojan can be modified and used as an infostealer campaign,” Morris said. “The criminals are already good at evading detection and have modernized that.”

Patrick Tiquet, vice president of security and architecture at Keeper Security, pointed out that cyberattacks are constantly evolving and, as they continue to grow in sophistication and volume, intrusions that combine both phishing and social engineering are becoming more common.

“It is difficult to detect these types of attacks when they mimic legitimate user activity, especially if an attacker is able to compromise both login credentials and MFA,” he says.

He noted a recent trend involves cybercriminals attempting to intercept emails and text messages with authentication or one-time passcodes.

MFA Fatigue

Another method of bypassing MFA is by “bombing” the user with MFA requests until they become so fatigued that they accept one, either on purpose or accidentally.

“It’s important to note that while MFA is still a best practice for protecting your passwords against these types of attacks, not all MFA methods are created equal and none are infallible,” he says. “That’s why it’s important to use a password manager with zero-trust architecture as a first line of defense.”

A password manager will create high-strength random passwords for every website, application and system and encrypt passwords to limit any information a bad actor can access.

“Password managers will also enable strong forms of two-factor authentication, such as an authenticator app, to protect against remote data breaches,” Tiquet explained. 

Joseph Carson, chief security scientist and advisory CISO at Delinea, said MFA fatigue has increased as more organizations enforced MFA for many of their employees.

“Getting the balance right between security and productivity is always a fine line, and when you get it wrong it results in cybersecurity fatigue,” he explained. “Security has always caused friction for employees, such as antivirus making their device slow or firewalls preventing them from accessing legitimate business applications.”

Carson said finding the right balance between productivity and security is essential and involves moving more security controls into the background. That way they can continue to verify both the authorization and authentication—such as whether the request comes from the same location as the push notification is being sent.  

“Using privileged access management to ensure strong, unique passwords for every account makes it more difficult for attackers to even try abusing MFA fatigue,” he adds. 

Carson explained that while MFA is one way to reduce risks, it is not 100% protection and security pros must always take a “defense-in-depth” approach to cybersecurity. They should move as much security as they can into the background so security becomes usable and results in less friction and fatigue, he added. 

“Solid cybersecurity awareness training is also critical so employees know how to identify a suspicious MFA push notification,” he noted.

Morris agreed that it’s equally important to train employees to identify suspicious phishing emails or smishing text messages seeking to install malware into critical systems, prevent user access and steal sensitive data.

“Employees must also be made aware of MFA bombing, so they know to escalate the issue to IT instead of trying to log in themselves, accidentally giving a cybercriminal access to their accounts,” he added.

Read the full article here

ShareTweetSharePinShareShareSend

Related Articles

Cyberattack on Fintech Firm Disrupts Derivatives Trading Globally
Cyber Intelligence

Cyberattack on Fintech Firm Disrupts Derivatives Trading Globally

Palo Alto Networks and TELMEX-Scitum Reinforce Their Commitment to Offer Extended Managed Detection and Response (XMDR)
Cyber Intelligence

Palo Alto Networks and TELMEX-Scitum Reinforce Their Commitment to Offer Extended Managed Detection and Response (XMDR)

Using real-time data platforms to plug cybersecurity skills gap
Cyber Intelligence

Using real-time data platforms to plug cybersecurity skills gap

Trace3, ExtraHop Launch Managed Detection and Response (MDR) Services
Cyber Intelligence

Trace3, ExtraHop Launch Managed Detection and Response (MDR) Services

Spain: Rights experts call for probe into claim Catalan leaders were spied on
Cyber Intelligence

Spain: Rights experts call for probe into claim Catalan leaders were spied on

Enterprise Exposure to Cyberattacks Vastly Elevated with Increased Dependency on Third-Party Partners
Cyber Intelligence

Enterprise Exposure to Cyberattacks Vastly Elevated with Increased Dependency on Third-Party Partners

How Do Threat Hunters Keep Organizations Safe?
Cyber Intelligence

How Do Threat Hunters Keep Organizations Safe?

Cyber Threat Intelligence Services Market to Witness Huge
Cyber Intelligence

Cyber Threat Intelligence Services Market to Witness Huge

APT groups use ransomware TTPs as cover for intelligence gathering and sabotage
Cyber Intelligence

APT groups use ransomware TTPs as cover for intelligence gathering and sabotage

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended Stories

Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Chinese Chipmaker Nexperia: Gigabytes of Data Stolen

Chinese Chipmaker Nexperia: Gigabytes of Data Stolen

Popular VPN Software Flaw Let Attackers Crash the Systems

Popular VPN Software Flaw Let Attackers Crash the Systems

Hackers Customize LockBit 3.0 Ransomware To Attack Orgs Worldwide

Hackers Customize LockBit 3.0 Ransomware To Attack Orgs Worldwide

What Security Leaders Need to Know

What Security Leaders Need to Know

The most important cyber news and events of the day

Be the first to know latest important news & events directly to your inbox.

By signing up, I agree to our TOS and Privacy Policy.

Popular Stories

  • Fortinet Vulnerability Exploited To Deploy RMM Tools & Backdoor

    Fortinet Vulnerability Exploited To Deploy RMM Tools & Backdoor

    0 shares
    Share 0 Tweet 0
  • Malware Trends 2024 – Top Malware Families and Types

    0 shares
    Share 0 Tweet 0
  • French Football Club Ticketing System Targeted in Cyber Attack

    0 shares
    Share 0 Tweet 0
  • Singha Durbar server continues to face cyberattacks

    0 shares
    Share 0 Tweet 0
  • Argentina – Global Investigations Review

    0 shares
    Share 0 Tweet 0
Cyber Affairs

Cyber Affairs is your one-stop news website for the latest cyber crime, cyber warfare, and all cyber related news and updates, follow us to get the news that matters to you.

LEARN MORE »

Recent News

  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry
  • Chinese Chipmaker Nexperia: Gigabytes of Data Stolen
  • Popular VPN Software Flaw Let Attackers Crash the Systems

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

The most important cyber news and events of the day

Be the first to know latest important news & events directly to your inbox.

By signing up, I agree to our TOS and Privacy Policy.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.