Get Help Now
CONTACT US

From the Cybersecurity News Desk

Prompt Bombs Subvert Multi-Factor Authentication

It’s pretty widely accepted in the cybersecurity world that some form of multi-factor authentication (MFA) is better than nothing.  Unfortunately, MFA is not the panacea many assume. “As we have seen, cyber predators have found MFA workarounds,” said Ron Westfall, senior analyst and research director at Futurum Research. “Too many organizations limit their use of MFA with these methods when stronger MFA controls can be achieved with cryptographic techniques, authentication apps and physical keys.”

The most widely implemented frameworks of MFA rely heavily on human behavior.  And that’s where the solution begins to crumble.  “Not all forms of MFA are created equal,” says Jason Rebholz, CISO at Corvus Insurance. “The reality is that most MFA implementations do rely on human behavior and decision making. Hackers exploit this with new techniques like MFA prompt bombing, which aims to annoy the user into clicking ‘approve’ to make the prompts stop.”

“Every security innovation is eventually bypassed. MFA ups the game for attackers and makes it harder, but security is never done,” said Peter Firstbrook, research VP at Gartner. “We have to assume failure and prepare for these types of bypasses, rather than keep searching for the perfect authentication method.”

As it has been proven time and again over the past decade, cybersecurity is an ever-evolving landscape that requires constant monitoring and comprehensive, full spectrum solutions.  No single technology, methodology or framework will be your ultimate protector.

See How We Can Help!

Fill out this form and we’ll be in touch shortly

    Number of Employees - select one:
    Industry - select one:

    Through our comprehensive approach to cybersecurity, we’ll help ensure your organization is protected against evolving threats like MFA subversion.

    CYBER OPERATIONS

    Be Proactive with Awareness Training

    80% of all cyber breaches start with a failure at the human level.

    Achieve Readiness with Managed SOC

    Connect people, process & technology in one workflow.

    Cybersecurity Incidents Happen

    Plan, prevent, and mitigate with our incident response team.

    View expert analysis on the latest threats 

    Finding qualified security professionals can be difficult and costly.

    Ours are the best. Put them to work for you.

    Contact Us
    Privacy Settings
    We use cookies to enhance your experience while using our website. If you are using our Services via a browser you can restrict, block or remove cookies through your web browser settings. We also use content and scripts from third parties that may use tracking technologies. You can selectively provide your consent below to allow such third party embeds. For complete information about the cookies we use, data we collect and how we process them, please check our Privacy Policy
    Youtube
    Consent to display content from - Youtube
    Vimeo
    Consent to display content from - Vimeo
    Google Maps
    Consent to display content from - Google
    Spotify
    Consent to display content from - Spotify
    Sound Cloud
    Consent to display content from - Sound
    Contact Us