Source: Dark Reading Author: Elizabeth Montalbano, Contributing Writer URL: https://www.darkreading.com/cyberattacks-data-breaches/researchers-crack-microsoft-azure-mfa-hour
ONE SENTENCE SUMMARY:
Researchers discovered a critical vulnerability in Microsoft Azure MFA that allowed rapid unauthorized access to user accounts.
MAIN POINTS:
- Oasis Security researchers found a flaw in Microsoft Azure’s multifactor authentication (MFA).
- The vulnerability allowed unauthorized access to Microsoft 365 accounts affecting over 400 million users.
- The attack, called “AuthQuake,” involved exhausting 6-digit code possibilities rapidly.
- Users received no alerts during failed sign-in attempts, masking the attack’s presence.
- Microsoft acknowledged the issue in June, fully fixing it by October 9.
- Attackers had an extended 2.5-minute window to guess a single MFA code.
- The attackers’ chance of successfully guessing the code increased significantly due to this time extension.
- Oasis recommended using authenticator apps and strong passwordless methods for security.
- Regular password changes are essential for maintaining account security.
- Organizations should implement alerts for failed MFA attempts to enhance user awareness.
TAKEAWAYS:
- MFA is not infallible, and vulnerabilities can expose user accounts.
- Rate limits on sign in attempts are crucial to prevent brute force attacks.
- Immediate alerts for suspicious sign-in activity can enhance user account security.
- Organizations must enforce stricter time limits on code validity for better security.
- Regular training and best practices in password hygiene are key to protecting accounts.