Hacks That Bypass MultiFactor Authentication and How to Make Your MFA Solution Phishing Resistant Roger A. Grimes Data-Driven Security Evangelist rogerg@knowbe4.com About Roger Roger A. Grimes Data-Driven Defense Evangelist KnowBe4, Inc. e: rogerg@knowbe4.com Twitter: @RogerAGrimes LinkedIn: https://www.linkedin.com/in/rogeragrimes/ • • 30 years plus in computer security, 20 years pen testing • Consultant to world’s largest companies and militaries for decades • • • Previous worked for Foundstone, McAfee, Microsoft • Frequently interviewed by magazines (e.g. Newsweek) and radio shows (e.g. NPR’s All Things Considered) Expertise in host and network security, IdM, crypto, PKI, APT, honeypot, cloud security Written 13 books and over 1,200 magazine articles InfoWorld and CSO weekly security columnist 2005 2019 Certification exams passed include: • • • • • • CPA CISSP CISM, CISA MCSE: Security, MCP, MVP CEH, TISCA, Security+, CHFI yada, yada Background Bio • Penetration tester for over 20 years • Worked on dozens of MFA and MFA hacking projects • Wrote Hacking Multifactor Authentication book (Wiley) • • Delivered Many Ways to Hack MFA webinar for years • • https://info.knowbe4.com/webinar-12-ways-to-defeat-mfa Wrote free 12 Ways to Hack 2FA ebook • • https://www.amazon.com/Hacking-Multifactor-Authentication-Roger-Grimes/dp/1119650798 https://info.knowbe4.com/12-way-to-hack-two-factor-authentication Helped develop the Multifactor Authentication Security Assessment tool • https://www.knowbe4.com/multi-factor-authentication-security-assessment Roger’s Books 4 About Us • Provider of the world's largest integrated Security Awareness Training and Simulated Phishing platform • Based in Tampa Bay, Florida, founded in 2010 • CEO & employees are ex-antivirus, IT Security pros • We help tens of thousands of organizations manage the ongoing problem of social engineering • Winner of numerous industry awards Agenda • Examples of hacking MFA • Characteristics that make MFA easily hackable • US government recommendations for effective MFA • Features you should look for in a strong MFA solution • Which phish-resistant MFA you should be using • Why a strong human firewall is your best, last line of defense 6 This presentation may contain real and/or simulated phishing attacks. The trade names/trademarks of any third parties used in this presentation are solely for illustrative and educational purposes. Trademarks are property of their respective owners and the use or display of any mark does not imply any affiliation with, endorsement by, or association of any kind between such third parties and KnowBe4, if any. The bad guys don’t care about this and use them anyway to trick you…. 7 My MFA Statement • “People should use phishing-resistant MFA whenever they can to protect valuable data and systems” – Roger A. Grimes • I like MFA • Its protective value is just oversold to most people 8 MFA Reality • Anything can be hacked • Any MFA solution can be hacked • But some MFA solutions are far more resilient than others 9 Agenda • Examples of hacking MFA • Characteristics that make MFA easily hackable • US government recommendations for effective MFA • Features you should look for in a strong MFA solution • Which phish-resistant MFA you should be using • Why a strong human firewall is your best, last line of defense 10 Very Common MFA Hack Network Session Hijacking • Usually requires Man-in-the-Middle (MitM) attacker • Attacker puts themselves inside of the communication stream between legitimate sender and receiver • Doesn’t usually care about authentication that much • Just wants to steal resulting, legitimate access session token after successful authentication • On web sites, session tokens are usually represented by a “cookie” (a simple text file containing information unique for the user/device and that unique session) • Session token usually just good for session Very Common MFA Hack Network Session Hijacking Proxy Theft Network Session Hijacking 1. Bad guy convinces victim to visit rogue (usually a look-alike) web site, which proxies input to real web site 2. Prompts victim to put in MFA credentials 3. Victim puts in credentials, which bad guy relays to real web site 4. Bad guy intercepts victim’s resulting access control token 5. Bad guy logs into real site, and drops legitimate user 6. Takes control over user’s account 7. Changes anything user could use to take back control Very Common MFA Hack Kevin Mitnick Hack Demo Network Session Hijacking https://blog.knowbe4.com/heads-up-new-exploit-hacks-linkedin-2-factor-auth.-see-this-kevin-mitnick-video MFA Hacks Kevin Mitnick Hack Demo Network Session Hijacking https://blog.knowbe4.com/heads-up-new-exploit-hacks-linkedin-2-factor-auth.-see-this-kevin-mitnick-video Very Common MFA Hack Kevin Mitnick Hack Demo Network Session Hijacking 1. Phishing email contained URL to fake look-alike/sound-alike web site that was really an evil proxy 2. Email tricked user into visiting evil proxy web site 3. User typed in credentials, which proxy, now pretending to be the legitimate customer, presented to legitimate web site 4. Legitimate web site sent back legitimate session token, which Kevin then stole and replayed to take over user’s session • Kevin used Evilginx (https://breakdev.org/evilginx-advanced-phishing-withtwo-factor-authentication-bypass/) • One example hack out of the dozens, if not hundreds of ways to do session hijacking, even if MFA is involved Very Common MFA Hack News Stories Network Session Hijacking MFA Hacks Real-World Example Network Session Hijacking 1. x MFA Hacks Real-World Example Network Session Hijacking https://arstechnica.com/information-technology/2018/12/iranian-phishers-bypass-2fa-protections-offered-by-yahoo-mailand-gmail/ MFA Hacks https://www.cybereason.com/blog/eventbot-a-new-mobile-banking-trojan-is-born Endpoint Attacks Hacking MFA US Gov’t Has Said since 2017 Not to Use Easily Hackable MFA Digital Identity Guidelines, NIST Special Publication 800-63 (https://www.nist.gov/itl/applied-cybersecurity/tig/projects/special-publication-800-63) • States the “Use of the PSTN [Public Switched Telephone Network or a phoneline connection in humanspeak] for out-of-band [authentication] verification is RESTRICTED”. • This means any authentication, including MFA that relies on your phone or phone number as part of its authentication, is “restricted” [i.e., not that secure]. This includes all SMS- and voice call-based MFA. • In 2021, Presidential executive order (EO 14028) had a clarifying follow-up memo (https://zerotrust.cyber.gov/federal-zero-trust-strategy/#identity) that stated, “For routine self-service access by agency staff, contractors and partners, agency systems must discontinue support [emphasis added] for authentication methods that fail to resist phishing, such as protocols that register phone numbers for SMS or voice calls, supply one-time codes, or receive push notifications. [emphasis added]” 20 Hacking MFA US Gov’t 2022 • OMB Memo M-22-09 released on January 26, 2022 • https://www.whitehouse.gov/wp-content/uploads/2022/01/M-22-09.pdf 21 Phone-Based MFA Summary of Phone-based MFA Hacking Methods Hacking • SIM Swap attack • I just get your phone number and SMS messaging switched to my phone • Deepfake voice calls • MitM proxy attacks often work • SMS Rogue Recovery Hack I like phone apps not tied to your phone number Rogue Recoveries Hacking Into Your Email Using Recovery Methods SMS Rogue Recovery SMS Rogue Recovery Hack • There is an inherent problem in that SMS message origination cannot be easily authenticated within SMS itself • Anyone can claim to be anyone To pull off hacker must have: • You email address and associated phone number Rogue Recoveries Hacking Into Your Email Using Recovery Methods SMS Rogue Recovery Steps 1. Hacker sends you a text pretending to be from your email provider asking for your forthcoming SMS PIN reset code Rogue Recoveries Hacking Into Your Email Using Recovery Methods SMS Rogue Recovery Steps 2. Hacker forces your email account into SMS PIN recovery mode Rogue Recoveries Hacking Into Your Email Using Recovery Methods SMS Rogue Recovery Steps 3. You get text from vendor with your reset code, which you then send to other number Rogue Recoveries Hacking Into Your Email Using Recovery Methods SMS Rogue Recovery Code from their email, bank account, or stock account being reset We can do this all day Hacking MFA Examples PushBased MFA I used to be a big fan!! Hacking MFA But What If… • USERS BLINDLY JUST APPROVE EVERY REQUEST • https://www.mandiant.com/resources/russian-targeting-gov-business 29 Agenda • Examples of hacking MFA • Characteristics that make MFA easily hackable • US government recommendations for effective MFA • Features you should look for in a strong MFA solution • Which phish-resistant MFA you should be using • Why a strong human firewall is your best, last line of defense 30 Hacking MFA 31 Hacking MFA Vulnerabilities often found in the transitions Vulnerabilities often found in the transitions 32 Hacking MFA Hacking Methodology Basic attack methods that work against most MFA solutions • Social Engineering (most popular and successful method) • Eavesdropping/MitM • Exploit Programming bug • Weak verification between components • Alternate recovery/bypass • Weak default configuration settings • Data/Network traffic malformation • 3rd Party Reliance issue (e.g., DNS, Active Directory, etc.) • Physical attacks • Others 33 Hacking MFA Let Me Threat Model Your MFA Solution KnowBe4 Multifactor Authentication Security Assessment (MASA) tool https://www.knowbe4.com/multi-factor-authentication-security-assessment • Asks you a series of questions and then tells you how I could hack it 34 Hacking MFA Try to avoid any MFA solution that can be easily social engineered or man-in-the-middle around Unfortunately, this is most MFA solutions 35 Resilient MFA Summary • Bare minimum bar – MFA solution should defeat MitM proxy attacks! • This is not true for 90%-95% of MFA today • Should contain enough features and information to help users defeat common attacks against that type of MFA • Should be MFA and not 1FA • Vendor should not oversell protection • Avoid any vendor saying it defeats “99%of attacks” or is “unhackable” 36 Resilient MFA Vendor Protections • Vendors developers should practice secure development lifecycle (SDL) • www.microsoft.com/sdl • https://wiki.sei.cmu.edu/confluence/ • • • • Vendor should have in-house code review and penetration testing Vendor should hire external pen testers Vendor should participate in bug bounties Vendor should aggressively respond to all hacking reports and not blow off bug reporters (who have validated hacking claims) • Vendor should educate buyers/users about common threats and how to defend 37 Resilient MFA Solutions My List of Good, Strong MFA • https://www.linkedin.com/pulse/my-list-good-strong-mfa-roger-grimes Don’t Use Easily Phishable MFA and That’s Most MFA! • https://www.linkedin.com/pulse/dont-use-easily-phishable-mfa-thats-most-rogergrimes US Government Says to Avoid Phishing-Resistant MFA and Why Is the Majority of Our MFA So Phishable? • https://www.linkedin.com/pulse/why-majority-our-mfa-so-phishable-roger-grimes and https://blog.knowbe4.com/u.s.-government-says-to-avoid-phishing-resistant-mfa 38 Resilient MFA Solutions Strong MFA Fast Identity Online (FIDO) MFA solutions • https://fidoalliance.org/ • It’s an open standard supported by over a hundred vendors, including Google, Microsoft, Yubico, etc. • Requires pre-registration of sites and services to token • Doesn’t respond to non-registered, MitM web sites • Publicly available threat model (only one I know of) • https://fidoalliance.org/specs/fido-v2.0-id-20180227/fido-security-ref-v2.0-id-20180227.html 39 Resilient MFA Solutions Strong MFA NIST 800-63-B AAL3-Level Solutions 40 Resilient MFA Solutions Strong MFA Smartcards • Most are AAL3 41 Resilient MFA Solutions Strong MFA Military CAC cards • Common Access Card • https://militarycac.com/ 42 Resilient MFA Solutions Strong MFA Google Advanced Protection Program • https://landing.google.com/advancedprotection • Requires FIDO-enabled security key • Has other checks, like secure downloads • Only works with Google sites, apps, and selected third party apps (e.g., Apple Mail, Mozilla Thunderbird, etc.) 43 Resilient MFA Solutions Strong MFA Various Selected Vendors 1Kosmos • https://www.1kosmos.com/ Beyond Identity • www.beyondidentity.com HYPR • https://www.hypr.com/true-passwordless-mfa/ 44 Resilient MFA Solutions Strong MFA Various Selected Vendors Transmit Security's BindID • https://www.transmitsecurity.com/bindid rfIDEAS • https://www.rfideas.com/ 45 Resilient MFA Push-Based MFA • Should include requirement that proves that approving user is actually logging on • Unfortunately, still does not stop MitM proxy attacks using this feature alone 46 Resilient MFA Solutions Strong MFA Do your own tests • Can your MFA beat a MitM proxy attack test? • Is it tied to a phone number? • Does it send a one-time password that you type in? 47 Resilient MFA Solutions Strong MFA What about biometrics? • Are biometrics strong authentication? • They can be • Is it 1FA or 2FA? • Easier to steal and replay 1FA • Is it phishable? • Depends on the application, most are for device logons and not as phishable • But, most solutions not nearly as accurate as touted • Is it allowed for remote logons? • But still perhaps good enough for most applications 48 Agenda • Examples of hacking MFA • Characteristics that make MFA easily hackable • US government recommendations for effective MFA • Features you should look for in a strong MFA solution • Which phish-resistant MFA you should be using • Why a strong human firewall is your best, last line of defense 49 Key Takeaways Parting Thoughts – Education is Necessary No matter which type of MFA you choose, educate everyone: • Buyers, Evaluators, Implementors, Users, Senior management Topics: • Strengths and weaknesses • How to correctly use the MFA solution • Including what might indicate a malicious attempt to abuse it • And what to do during rogue attacks • What MFA does and doesn’t prevent • The common possible attacks for that type of MFA and how to prevent • You wouldn’t give people passwords without warning them about common hacker tricks 50 KnowBe4 Security Awareness Training Baseline Testing We provide baseline testing to assess the Phish-Prone™ percentage of your users through a free simulated phishing attack. Train Your Users The world's largest library of security awareness training content; including interactive modules, videos, games, posters and newsletters. Automated training campaigns with scheduled reminder emails. Phish Your Users Best-in-class, fully automated simulated phishing attacks, thousands of templates with unlimited usage, and community phishing templates. See the Results Enterprise-strength reporting, showing stats and graphs for both training and phishing, ready for management. Show the great ROI! 51 Generating Industry-Leading Results and ROI • Reduced Malware and Ransomware Infections • Reduced Data Loss • Reduced Potential Cyber-theft • Increased User Productivity • Users Have Security Top of Mind 85% Average Improvement Across all industries and sizes from baseline testing to one year or more of ongoing training and testing Questions? Roger A. Grimes– Data-Driven Defense Evangelist, KnowBe4 rogerg@knowbe4.com Twitter: @rogeragrimes https://www.linkedin.com/in/rogeragrimes/ Tel: 855-KNOWBE4 (566-9234) | www.KnowBe4.com | Sales@KnowBe4.com