Blog Articles
Read MSP360’s latest news and expert articles about MSP business and technology
Multi Factor Authentication MFA

Multi-Factor Authentication (MFA) as a Must-Have for MSPs

Multi-Factor Authentication (MFA) as a Must-Have for MSPs

When a tech giant like Microsoft says a simple tool can prevent 99.9% of attacks, that should be enough to grab your attention. Multi-factor authentication (MFA) is not a catchall security tool but it can certainly be your first line of defense against sensitive data breaches. Here’s everything you need to know about making the most of any MFA system.

How MFA works

As the name suggests, a multi-factor authentication mechanism identifies users based on multiple pieces of evidence. Any combination of the following factors constitutes a successful implementation of an MFA system.

  • Knowledge—something that the user knows—a PIN or a passphrase
  • Possession—something that the user has—a smart key or an OTP (one-time-password)
  • Inherence—something that the user is—biometric IDs

If only two factors are utilized, the mechanism is referred to as “2FA”. Not to be confused with 2-step verification, a 2FA system is a simple implementation of an MFA.

Further reading Two-Factor Authentication: Solutions, Methods, Best Practices

An ideal multi-factor authentication must utilize independent factors. For example, a password to access a computer (knowledge) should not be the same as the password to retrieve an OTP from a mobile device (possession). MFA systems can be further strengthened by embedding geolocation and device signatures in the authentication layer.

MFA System Adoption Rate

Recent data breaches have forced many companies to take a more holistic approach to secure their assets. While network and data security continue to be a priority, adoption of MFA system ties up any loose ends left behind.

A LastPass survey concluded that 57% of enterprise clients around the world implement MFA. Last year alone recorded a growth of over 12%. The COVID-19 pandemic has only added to this trend by bringing remote work to the mainstream. These are the key contributors to an increased MFA system adoption rate:

  • The popularity of biometrics: With an array of biometric identification technology available today, there’s hardly anyone left out. The dramatic improvement in the imaging capability of consumer electronics and robust blockchain implementation of scanned images has taken biometrics to a whole new level.
  • Availability of authentication apps: The better integration and built-in security of authentication apps have improved the adoption of MFA. These apps boost consumer confidence with a multi-platform presence and hassle-free recovery options.

How Hackers Get Past MFA System

Like any other security measure, MFA is not foolproof. Since the MFA system is nothing but a combination of other single-authentication methods, a hacker can specifically attack individual elements. Other attack vectors could involve behavioral factors or faulty technical implementation. Here are some common scenarios:

  • Brute-force attacks: When attackers try out common passwords with random user IDs, they might get lucky a couple of times. This is particularly an issue with MFA system. For instance, some MFA systems only slow down the repeated login attempts, instead of locking them out. A single-authentication system responds better to this threat by limiting failed attempts.
    Further reading Password Management Best Practices for MSPs
  • Biometrics theft: Being sensitive, biometrics are handled carefully across the board. However, a normal use case may ultimately employ them on multiple machines over the cloud. This exposes vulnerable biometric data to attackers, who might be able to recreate them, even if they can’t get their hands on them. Once they have a copy of the user’s biometrics, an MFA system breach becomes a piece of cake.
  • Intercepting cookies: Cookies contain important user data on the browser for a streamlined user experience. This includes sensitive data like multi-factor authentication credentials. An attacker can utilize any number of side-channel attacks to obtain this data and gain access to sensitive accounts. Because of many unpatched and even zero-day vulnerabilities out in the wild, an unsuspecting user may not even know about the breach.
  • Local access: If local admin access is compromised, all the data in a user’s system is exposed to vulnerabilities. This can include biometrics or other data that may lead to a breach of MFA system. Even if strong encryption prevents data theft, local access can expose other insightful information about the user. This can help attackers to make more-informed guesses on other attack surfaces.
  • SIM cloning: Wireless providers are increasingly abandoning physical SIM cards by adopting virtual SIMs. Digital copies open the door to the mass cloning of SIM data, enabling attackers to intercept a victim’s communications. This means they have seamless access to MFA tokens. Being the most popular possession factor in any MFA system, SMS OTPs expose a large number of users to vulnerabilities.
  • Recovery attack: While most MFA systems are very secure, they are forgiving when it comes to recovery. This ensures that users have access to the most sensitive data in situations of urgency. Attackers know this full well and prey on vulnerable users. They impersonate a forgetful user and try to gain access to their accounts with wild guesses. MFA systems utilizing security questions for recovery are particularly vulnerable. For example, a determined hacker can easily guess the model of a user’s first car!
  • Social engineering: When everything else fails, an attacker can turn to social engineering to exploit innocent users. A social engineering attack can take many forms. It can be as simple as a phishing email or a more elaborate scheme where the users are actively targeted with personalized baits. No MFA vendor can fully address this vulnerability, as this scheme relies heavily on behavioral factors.
FREE ASSETS
MSP’s Assets to Stay Safe from Phishing
Check out our assets that will help you to minimize the risk of a phishing attack, reduce the possible damage, and increase security awareness.
New call-to-action
WP icon

MFA System Attacks Prevention

Even with many loose ends, MFA is preferable to any single-authentication system. Below are some actionable steps to prevent MFA system attacks:

Choose the Right MFA Vendor

Choosing the right vendor is as important as implementing MFA system itself. While most vendors tend to prioritize security, some give more weight to user experience and reporting. Attackers are actively looking for any weak points they can find, and vendors are no exception. You must pick your MFA vendor diligently and make sure they:

  New call-to-action
  • Use mutual SSL authentication
  • Implement a lockout policy for unauthorized login attempts
  • Use development best practices like SDLC
  • Address social engineering attacks
  • Utilize passive contextual authentication, such as geolocation

Further reading Guide To Vetting Cybersecurity Vendors

Have a Trusted-Link Policy

Regardless of the entry point, a malicious link can challenge any MFA system. Major software and hardware vendors struggle to stop side-channel and RCE attacks initiated by just a simple link. A trusted-link policy alone can eliminate many attack vectors. A trusted-link policy may include:

  • Only clicking links from verified senders
  • Disabling links from email by default
  • Scanning links for security before clicking them

Make Education the Center Stage

To reap all the rewards of MFA, you must stay on top of education, both as an administrator and as an end-user. Adapting to the changing security environment is the only way to stay secure. The inclusion of periodic hacking awareness in all end-user training sessions is a must.

Further reading Guide to End-User Training

Monitor Security Hygiene

No MFA system is secure if any of the involved factors are exposed to vulnerabilities. Users must practice security hygiene at all times. For example, users must:

  • Prefer local OTP generation over SMS OTPs
  • Use out-of-band authentication whenever possible
  • Avoid password sharing, recycling, and replay
  • Pick unique password combinations
  • Avoid generic answers to recovery questions
  • Avoid suspicious sites and recognize spammy behavior
  • Avoid public and unsecured network connections whenever possible

Conclusion

While MFA is not unhackable, it continues to provide unmatched protection. MFA attacks are rare and mostly target soft attack surfaces—phishing, social engineering, and the like. These vulnerabilities can easily be addressed through education and general security hygiene. Combined with other measures, the MFA system can prove to be a strong and effective security tool.

author avatar
Kate C
Kate is a MSP360 content manager. Before joining MSP360, Kate worked as a sales representative for a managed services provider. During her time with that company, she studied every aspect of managed services. She is a producer for MSP Voice podcast and a writer of MSP-oriented articles.
MSP’s Educational Posters on Password Security

The poster pack includes:

  • Best practices for creating strong passwords
  • Reminders on how secure passwords should look like
  • Chart to check if your password is secure enough
New call-to-action
Whitepaper icon