Why MFA alone won’t protect you in the age of adversarial AI


Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More


For a long time, multi-factor authentication (MFA) — in the way of push notifications, authenticator apps or other secondary steps — was thought to be the answer to the mounting cybersecurity problem. 

But hackers are cunning and crafty and come up with new ways all the time to break through the fortress of MFA. 

Today’s enterprises need even stronger defenses — while experts say MFA is still critical, it should be just a small piece of the authentication process. 

“Traditional MFA methods, such as SMS and push notifications, have proven to be vulnerable to various attacks, making them nearly as susceptible as passwords alone,” said Frank Dickson, group VP for security and trust at IDC. “The growing prevalence of sophisticated threats requires a move towards stronger authentication methods.”

Why isn’t MFA enough?

The once tried-and-true practice of relying on passwords now seems quaint. 

No matter what string of numbers, letters, special characters or numbers they comprised, they became so easy to steal as users were careless, lazy, gullible or overtrusting.

“Traditional passwords are simply shared secrets, not much more advanced than a Roman sentry asking for the secret codeword thousands of years ago (‘Halt, who goes there? What’s the passcode?),” said  Lou Steinberg, founder and managing partner at CTM insights. 

As Matt Caulfield, VP of product for identity security at Cisco, told VentureBeat: “As soon as those were stolen, it was game over.”

MFA became more mainstream in the mid-1990s to 2000s as more enterprises went online, and it seemed a solution to traditional passwords. But with digital transformation, the shift to the cloud, and the adoption of dozens or even hundreds of SaaS apps, enterprises are more vulnerable than ever. They no longer safely hide away behind firewalls and data centers. They lack control and transparency. 

“MFA changed the game for a long time,” said Caulfield. “But what we’ve found over the past 5 years with these recent identity attacks is that MFA can easily be defeated.”

One of the greatest threats to MFA is social engineering or more personalized psychological tactics. Because people put so much of themselves online — via social media or LinkedIn — attackers have free reign to research anyone in the world. 

Thanks to increasingly sophisticated AI tools, stealthy threat actors can craft campaigns “at mass scale,” said Caulfield. They will initially use phishing to access a user’s primary credential, then employ AI-based outreach to trick them into sharing a second credential or take action that allows attackers into their account. 

Or, attackers will spam the secondary MFA SMS or push notification method causing “MFA fatigue,” when the user eventually gives in and pushes “allow.” Threat actors will also prime victims, making situations seem urgent, or fool them into thinking they’re getting legitimate messages from an IT help desk.

With man-in-the-middle attacks, meanwhile, an attacker can intercept a code during transmission between user and provider. Threat actors may also deploy tools that mirror login pages, tricking users into providing both their passwords and MFA codes.

Enter passwordless

The downfalls of MFA have prompted many enterprises to adopt passwordless methods such as passkeys, device fingerprinting, geolocation or biometrics. 

With passkeys, users are authenticated through cryptographic security “keys” stored on their computer or device, explained Derek Hanson, VP of standards and alliances at Yubico, which manufactures the widely-used YubiKey device. 

Each party must provide evidence of their identity and communicate their intention to initiate authentication. Users can sign into apps and websites with a biometric sensor (such as a fingerprint or facial recognition), PIN or pattern. 

“Users are not required to recall or manually enter long sequences of characters that can be forgotten, stolen or intercepted,” said Hanson. This reduces the burden on users to make the right choices and not hand over their credentials during a phishing attempt.

“Approaches like device fingerprinting or geolocation can supplement traditional MFA,” explained Anders Aberg, director of passwordless at Bitwarden. “These methods adjust security requirements based on user behavior and context — such as location, device or network — reducing friction while maintaining high security.”

The tandem use of devices and biometrics is on the rise, Caulfield agreed. At initial sign-in and verification, the user shows their face along with physical identification such as a passport or driver’s license, and the system performs 3D mapping, which is a sort of “liveness check.” Once photo IDs are confirmed with government databases, the system will then register the device and fingerprint or other biometrics. 

“You have the device, your face, your fingerprint,” said Caulfield. “The device trust piece is much more prevalent as the new silver bullet for preventing phishing and AI-based phishing attacks. I call it the second wave of MFA. The first wave was the silver bullet until it wasn’t.”

However, these methods aren’t completely foolproof, either. Hackers can get around biometrics tools by using deepfakes or by simply stealing a photo of the legitimate user. 

“Biometrics are stronger than passwords, but once compromised they are impossible to change,” said Steinberg. “You can change your password if needed, but did you ever try to change your fingerprint?”

Leveraging analytics, creating a failsafe

Caulfield pointed out that organizations are incorporating analytics tools and amassing mountains of data — yet they’re not putting it to use to bolster their cybersecurity. 

“These tools generate a ton of telemetry,” said Caulfield, such as who is signing in, from where and on what device. But they’re then “sending that all into a black hole.” 

Advanced analytics can help with identity threat detection and analytics, even if after the fact to provide a “stopgap or failsafe” when attackers bypass MFA, he said. 

Ultimately, enterprises must have a fail-safe strategy, agreed Ameesh Divatia, co-founder and CEO at data privacy company Baffle. Personally identifiable information (PII) and other confidential data must be cryptographically protected (masked, tokenized or encrypted). 

“Even if you have a data breach, cryptographically protected data is useless to an attacker,” said Divatia. In fact, GDPR and other data privacy laws don’t require companies to notify affected parties if cryptographically protected data gets leaked, because the data itself is still secure, he pointed out.

“Fail safe just means that when one or more of your cybersecurity defenses fail, then your data is still secure,” said Divatia. 

There’s a reason it’s called ‘multifactor’

Still, that’s not to say that MFA is completely going away. 

“In the entire scheme of things, the hierarchy of authentication starts with MFA, as weak MFA is still better than not having it at all, and that shouldn’t be overlooked,” said Dickson. 

As Caulfield pointed out, it’s called multi-factor authentication for a reason — “multi” can mean anything. It can ultimately be a mix of passwords, push notifications, fingerprint scans, physical possession of a device, biometrics or hardware and RSA tokens (and whatever evolves next). 

“MFA is here to stay, it’s just the definition now is ‘How good is your MFA’? Is it basic, mature or optimized?,” he said. However, in the end, he emphasized: “There’s never going to be a single factor that in and of itself is completely secure.”



Source link

Share

Latest Updates

Frequently Asked Questions

Related Articles

Macron Pitches Lighter Regulation to Fuel A.I. Boom in Europe

An artificial intelligence race is heating up between the United States and China...

Best over-the-air DVR for cord cutters in 2025

You might not need a TV antenna to cut the cord, but one...

Decoding OpenAI’s Super Bowl ad and Sam Altman’s grandiose blog post

Join our daily and weekly newsletters for the latest updates and exclusive content...
SULTAN88
SULTANSLOT
RAJA328
JOIN88
GFC88
HOKIBET
RUSIASLOT88
TAHU69
BONANZA99
PRAGMABET
MEGA55
LUXURY777
LUXURY333
BORJU89
QQGAMING
KEDAI168
MEGA777
NAGASLOT777
TAKSU787
KKSLOT777
MAS77TOTO
bandar55
BOS303
HOKI99
NUSA365
YUHUSLOT
KTP168
GALAXY138
NEXIA138
PETIR33
BOOM138
MEGA888
CABE888
FOSIL777
turbospin138
KAPAKBET
SUPERJP
sultankoin99
dragon88
raffi888
kenzobet
aladin666
rgo365
ubm4d
GERCEP88
VIVA99
CR777
VOXY88
delman567
intan69
CABE888
RNR303
LOGO303
PEMBURUGACOR
mpo383
cermin4d
bm88
ANGKA79
WOWHOKI
ROKET303
MPOXL
GURITA168
SUPRASLOT
SGCWIN
DESA88
ARWANA388
DAUNEMAS
ALADDIN666
BIOWIN69
SKY77
DOTA88
NAGA138
API5000
y200m
PLAYBOOK88
LUXURY12
A200M
MPO700
KENANGAN4D
cakrabola
PANDAGENDUT
MARVEL77
UG300
HOKI178
MONTE77
JASABOLA
UNTAR4D
LIDO88
MAFIABOLA77
GASPOL189
mpo999
untung138
TW88
JAGUAR33
MPOBOS
SHIO88
VIVO4D
MPOXL
JARISAKTI
BBO303
AONCASH
ANGKER4D
LEVIS4D
JAGO88
REPUBLIK365
BOSDEAL88
BOLA168
akunjp
WARTEGBET
EZEBET
88PULSA
KITAB4D
BOSDEAL88
STUDIOBET
MESINKOIN
BIMA88
PPNUSA
ABGBET88
TOP77
BAYAR77
YES77
BBTN4D
BBCA4D
VSLOTS88
MPO800
PAHALA4D
KPI4D
JURAGAN77
QQ188
BOLAPELANGI
C200M
QQ998
GWKTOGEL
MEGABANDAR
COLOWIN
VIP579
SEVEN4D
MPO188
DEWATA88
SURAT4D
SINAR123
LAMBO77
GUDANG4D
AWAN4D
PLANETLIGA
GT88
ROYALSPIN88
MAMAJITU
MITO99
PEDIA4D
WIBU69JP
333HOKI
SIDARMA88
NAGAEMAS99
HOLA88
CAKAR76
KINGTOTO
RATUGAMING
SSI168
PILAR168
ACTOTO
EYANGTOGEL
KAISAR328
SLOT628
KAISAR88
DOTA88
MAXWIN369
ALIBABA99
MM168
SQUAD777
NAGABET88
JAYABOLA
SEMPATIGAME
PANDAJAGO
PIKAT4D
SINGA77
YUYU33
MASTERPLAY99
VICTORY39
NASA4D
PERMATA55
SAKAUSLOT
CK303
MPOTOWER
CIPUTRABET
WINJUDI
DEWI5000
IYA777
MAHIRTOTO
GOSLOT88
TIPTOP4D
RAJA787
JBO680
JOKER188
EPICPLAY88
TRIVABET
KAISAR189
JOKER81
JPSPIN88
MAYORA4D
DJARUMPLAY
OVO88
BAKTI78
WINGSLOT77
ICAFE4D
PDTOTO
JETPLAY88
CMBET88
CMBET88
didascaliasdelteatrocaminito.com
glenellynrent.com
gypsumboardequipment.com
realseller.org
https://harrysphone.com/upin
gyergyoalfalu.ro/tokek
vipokno.by/gokil
winjospg.com
winjos801.com/
www.logansquarerent.com
internationalfintech.com/bamsz
condowizard.ca
jawatoto889.com
hikaribet3.live
hikaribet1.com
heylink.me/hikaribet
www.nomadsumc.org
condowizard.ca/aromatoto
euro2024gol.com
www.imaracorp.com
daftarsekaibos.com
stuffyoucanuse.org/juragan
Toto Macau 4d
Aromatoto
Lippototo
Mbahtoto
Winjos
152.42.229.23
bandarlotre126.com
heylink.me/sekaipro
www.get-coachoutletsonline.com
wholesalejerseyslord.com
Lippototo
Zientoto
Lippototo
Situs Togel Resmi
Fajartoto
Situs Togel
Toto Macau
Winjos
Winlotre
Aromatoto
design-develop-test.com
winlotre.online
winlotre.xyz
winlotre.us
winlotrebandung.com
winlotrepalu.com
winlotresurabaya.shop
winlotrejakarta.com
winlotresemarang.shop
winlotrebali.shop
winlotreaceh.shop
winlotremakmur.com
Dadu Online
Taruhantoto
a Bandarlotre
bursaliga
lakitoto
aromatoto
Rebahin
untungslot.pages.dev
slotpoupler.pages.dev
rtpliveslot88a.pages.dev
tipsgameslot.pages.dev
pilihslot88.pages.dev
fortuertiger.pages.dev
linkp4d.pages.dev
linkslot88a.pages.dev
slotpgs8.pages.dev
markasjudi.pages.dev
saldo69.pages.dev
slotbenua.pages.dev
saingtoto.pages.dev
markastoto77.pages.dev
jowototo88.pages.dev
sungli78.pages.dev
volatilitas78.pages.dev
bonusbuy12.pages.dev
slotoffiline.pages.dev
dihindari77.pages.dev
rtpdislot1.pages.dev
agtslot77.pages.dev
congtoto15.pages.dev
hongkongtoto7.pages.dev
sinarmas177.pages.dev
hours771.pages.dev
sarana771.pages.dev
kananslot7.pages.dev
balitoto17.pages.dev
jowototo17.pages.dev
aromatotoding.com
unyagh.org
fairparkcounseling.com/gap/
impress-newtex.com/ajax/
SULTAN88
SULTANSLOT
RAJA328
JOIN88+
HOKIBET
GFC88
RusiaSlot88
Tahu69
BONANZA99
Pragmabet
mega55
luxury777
luxury333
borju89
qqgaming
KEDAI168
mega777
nagaslot777
TAKSU787
kkslot777
MAS77TOTO
BANDAR55+
BOS303
Login-HOKI99/
NUSA365
YUHUSLOT
ktp168
GALAXY138