Cloud

How hackers bypass MFA – and what to do about it



Businesses have to be increasingly wary of an industry-wide shift in phishing tactics to get around multi-factor authentication (MFA). Attackers may use tactics such as adversary in the middle (AiTM) techniques to bypass security layers such as MFA.

AiTM attacks are an evolution of the man-in-the-middle (MiTM) technique, where cyber criminals intercept communications between two parties to steal sensitive data. In an AiTM attack, adversaries can also actively interfere with these communications, modifying the messages rather than simply relaying them. This can allow for a seamless MFA bypass.



READ SOURCE

This website uses cookies. By continuing to use this site, you accept our use of cookies.