(MFA) Multifactor Authetication Basics

MFA is something that I am having to deal with increasingly in my work. It is something that is slowly becoming the norm for everyone across the board. So, I am going to do a write up of what is MFA, some of its shortcomings, and then I will have a link over to another article that is about what I am doing for the Azure/Office365 environment I manage to help negate some of those potential issues.

What is MFA?

MFA stands for Multi-Factor Authentication. It is a security process in which a user provides two or more authentication factors to verify their identity. The goal of MFA is to increase the security of online accounts and systems by requiring additional evidence of the user’s identity beyond just a password.

There are several types of authentication factors that can be used in MFA:

  • Knowledge-based factors: These are things that the user knows, such as a password or a PIN.
  • Possession-based factors: These are things that the user has, such as a phone or a security token.
  • Inherence-based factors: These are things that are inherent to the user, such as a fingerprint or a facial scan.

By requiring multiple factors, MFA makes it much harder for an attacker to gain access to a user’s account or system. This is because the attacker would need to have access to multiple pieces of information or objects to successfully authenticate and breach a user’s account.

MFA is necessary because relying on a single form of authentication, such as a password, is no longer sufficient to protect against the many different types of cyber threats that exist today. Hackers and other cybercriminals are constantly finding new ways to gain access to accounts and systems, and they are often successful in doing so.

Problems with MFA for End Users

While MFA can significantly improve the security of online accounts and systems, it is not without its limitations and potential problems. Particularly I have found that some end users can struggle with MFA and have issues with it. Below here are some of the ways I have encountered that end users have had issues with MFA systems.

  • User inconvenience: MFA can be inconvenient for users, as they may have to enter additional information or use additional devices to authenticate. This can be particularly problematic if a user doesn’t have access to their phone or other required devices at the time they need to authenticate.
  • Lack of awareness: Some users may not be aware of the need for MFA or may not understand how to use it. This can lead to confusion and frustration, as well as an increased risk of security breaches.
  • Complexity: MFA can be complex to implement and manage, particularly for organizations with large numbers of users. This can require significant resources and effort to set up and maintain.
  • Dependency on third-party devices: MFA often relies on the use of third-party devices, such as phones or security tokens. If these devices are lost, stolen, or otherwise unavailable, it can make it difficult or impossible for users to authenticate.
  • False negatives: In some cases, MFA systems may produce false negatives, meaning that they incorrectly reject a legitimate user’s attempt to authenticate. This can be frustrating for users and may lead to security breaches if the user tries to work around the MFA system.

MFA Vulnerabilities

There are a few other potential vulnerabilities of MFA that it is important to be aware of:

  • Social engineering attacks: MFA systems can be vulnerable to social engineering attacks, in which an attacker tries to trick a user into divulging sensitive information or giving them access to their accounts. For example, an attacker might impersonate a trusted source and ask the user for their MFA code or token.
  • Malware attacks: MFA systems may also be vulnerable to malware attacks, in which an attacker infects the user’s device with malicious software that is designed to capture MFA codes or tokens. This can allow the attacker to bypass MFA and gain unauthorized access to the user’s accounts or systems.
  • Shared or compromised devices: If a user’s device is shared with other people or has been compromised by an attacker, it may be possible for the attacker to access the user’s MFA codes or tokens. This can allow the attacker to bypass MFA and gain unauthorized access to the user’s accounts or systems.
  • Outdated MFA methods: Some older MFA methods, such as SMS-based authentication, may be less secure than newer methods and may be more vulnerable to attacks.
  • Device spoofing: Attackers may try to spoof a user’s device to bypass MFA. For example, an attacker might try to impersonate a user’s phone to receive MFA codes.
  • MFA Fatigue attack: The attacker continuously sent MFA requests to an end user hoping they would accidentally approve one of them. Most effective when users have notifications to their phone and just have to tap Approve.

To help protect against these vulnerabilities, it is important to use strong and unique passwords, be wary of suspicious emails or phone calls, and keep all devices and software up to date with the latest security patches. It is also a good idea to regularly review and update MFA settings and to use different types of MFA whenever possible. It is also important to be aware of social engineering tactics and to be cautious when providing sensitive information online.

 Lastly here is the link to another article I have that gives some tips about MFA in the Microsoft Environment.

Leave a Comment

Your email address will not be published. Required fields are marked *