{"id":11611,"date":"2024-03-29T16:27:25","date_gmt":"2024-03-29T03:27:25","guid":{"rendered":"https:\/\/kinetics.co.nz\/?p=11611"},"modified":"2024-03-29T16:27:25","modified_gmt":"2024-03-29T03:27:25","slug":"is-mfa-enough-the-need-for-multiple-cyber-security-layers","status":"publish","type":"post","link":"https:\/\/new.kinetics.co.nz\/?p=11611","title":{"rendered":"Is MFA enough? &#8211; the need for multiple cyber security layers."},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row column_structure=&#8221;3_4,1_4&#8243; disabled_on=&#8221;on|off|off&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;\/wp-content\/uploads\/2024\/03\/MFAvsHacker.png&#8221; background_position=&#8221;center_right&#8221; background_horizontal_offset=&#8221;46%&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;3_4&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(255,255,255,0.86)&#8221; custom_margin=&#8221;20px|20px|20px|20px|false|false&#8221; custom_padding=&#8221;20px|20px|20px|20px|false|false&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; border_width_all=&#8221;3px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<p>At Kinetics, we&#8217;ve always emphasized the importance of multi-factor authentication (MFA) as a critical layer in cybersecurity. Without MFA, it&#8217;s only a matter of time before you fall victim to a cyber attack.<\/p>\n<p>However, as we&#8217;ve also mentioned, no single defense is enough. Cybersecurity needs to be layered, and that includes MFA.<\/p>\n<h2>Without MFA, you WILL get hacked &#8211; it is only a matter of time.<\/h2>\n<h3>BuT MFA by itself is not enough.<\/h3>\n<p>Recently, cybercriminals have been using a platform called &#8220;Tycoon 2FA phishing-as-a-service&#8221; to target Microsoft 365 and Gmail accounts, bypassing two-factor authentication. This platform is similar to early hacks like &#8220;Dadsec,&#8221; indicating code-sharing among the hacker community.<\/p>\n<p>The latest version of Tycoon 2FA, released in 2024, shows a continuous effort to improve its stealth capabilities. It leverages 1,100 domains and has been identified in numerous phishing attacks. These attacks typically follow a multi-step process:<\/p>\n<ol>\n<li>Attackers distribute malicious links via emails with embedded URLs or QR codes, tricking victims into accessing phishing pages.<\/li>\n<li>A security challenge filters out bots, allowing only human interactions to proceed to the deceptive phishing site.<\/li>\n<li>Background scripts extract the victim&#8217;s email from the URL to customize the phishing attack.<\/li>\n<li>Users are quietly redirected to another part of the phishing site, moving them closer to the fake login page. This presents a fake Microsoft or Google login page to steal credentials.<\/li>\n<li>The kit mimics a 2FA challenge, intercepting the 2FA token or response to bypass security measures.<\/li>\n<li>Finally, victims are directed to a legitimate-looking page, obscuring the phishing attack&#8217;s success.<\/li>\n<\/ol>\n<p><strong>At Kinetics, our<a href=\"http:\/\/kinetics.co.nz\/proactive-it-service-and-support\/\"> KARE Foundation<\/a> defends you with DNS scrubbing, a browser extension, and geo-blocking, among other tools, to protect your organization from these types of attacks. Stay vigilant and stay protected with Kinetics.<\/strong><\/p>\n<h3>Read more:<\/h3>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/ne...ing-kit-targets-microsoft-365-gmail-accounts\/\">https:\/\/www.bleepingcomputer.com\/ne&#8230;ing-kit-targets-microsoft-365-gmail-accounts\/<\/a><\/p>\n<p><a href=\"https:\/\/blog.sekoia.io\/tycoon-2fa-a...-the-latest-version-of-the-aitm-phishing-kit\/\">https:\/\/blog.sekoia.io\/tycoon-2fa-a&#8230;-the-latest-version-of-the-aitm-phishing-kit\/<\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;3_4,1_4&#8243; disabled_on=&#8221;off|on|on&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; background_enable_image=&#8221;off&#8221; background_position=&#8221;center_right&#8221; background_horizontal_offset=&#8221;46%&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;3_4&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(255,255,255,0.86)&#8221; custom_margin=&#8221;5px|5px|5px|5px|false|false&#8221; custom_padding=&#8221;5px|5px|5px|5px|false|false&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; border_width_all=&#8221;0px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<p>At Kinetics, we&#8217;ve always emphasized the importance of multi-factor authentication (MFA) as a critical layer in cybersecurity. Without MFA, it&#8217;s only a matter of time before you fall victim to a cyber attack.<\/p>\n<p>However, as we&#8217;ve also mentioned, no single defense is enough. Cybersecurity needs to be layered, and that includes MFA.<\/p>\n<h2>Without MFA, you WILL get hacked &#8211; it is only a matter of time.<\/h2>\n<h3>BuT MFA by itself is not enough.<\/h3>\n<p>Recently, cybercriminals have been using a platform called &#8220;Tycoon 2FA phishing-as-a-service&#8221; to target Microsoft 365 and Gmail accounts, bypassing two-factor authentication. This platform is similar to early hacks like &#8220;Dadsec,&#8221; indicating code-sharing among the hacker community.<\/p>\n<p>The latest version of Tycoon 2FA, released in 2024, shows a continuous effort to improve its stealth capabilities. It leverages 1,100 domains and has been identified in numerous phishing attacks. These attacks typically follow a multi-step process:<\/p>\n<ol>\n<li>Attackers distribute malicious links via emails with embedded URLs or QR codes, tricking victims into accessing phishing pages.<\/li>\n<li>A security challenge filters out bots, allowing only human interactions to proceed to the deceptive phishing site.<\/li>\n<li>Background scripts extract the victim&#8217;s email from the URL to customize the phishing attack.<\/li>\n<li>Users are quietly redirected to another part of the phishing site, moving them closer to the fake login page. This presents a fake Microsoft or Google login page to steal credentials.<\/li>\n<li>The kit mimics a 2FA challenge, intercepting the 2FA token or response to bypass security measures.<\/li>\n<li>Finally, victims are directed to a legitimate-looking page, obscuring the phishing attack&#8217;s success.<\/li>\n<\/ol>\n<p><strong>At Kinetics, our <a href=\"http:\/\/kinetics.co.nz\/kare-security-foundation\/\">KARE Foundation<\/a> defends you with DNS scrubbing, a browser extension, and geo-blocking, among other tools, to protect your organization from these types of attacks. Stay vigilant and stay protected with Kinetics.<\/strong><\/p>\n<h3>Read more:<\/h3>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/ne...ing-kit-targets-microsoft-365-gmail-accounts\/\">https:\/\/www.bleepingcomputer.com\/ne&#8230;ing-kit-targets-microsoft-365-gmail-accounts\/<\/a><\/p>\n<p><a href=\"https:\/\/blog.sekoia.io\/tycoon-2fa-a...-the-latest-version-of-the-aitm-phishing-kit\/\">https:\/\/blog.sekoia.io\/tycoon-2fa-a&#8230;-the-latest-version-of-the-aitm-phishing-kit\/<\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>At Kinetics, we&#8217;ve always emphasized the importance of multi-factor authentication (MFA) as a critical layer in cybersecurity. Without MFA, it&#8217;s only a matter of time before you fall victim to a cyber attack. However, as we&#8217;ve also mentioned, no single defense is enough. Cybersecurity needs to be layered, and that includes MFA. Without MFA, you [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":11613,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[4,5],"tags":[],"class_list":["post-11611","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-security"],"_links":{"self":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts\/11611","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=11611"}],"version-history":[{"count":0,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts\/11611\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/"}],"wp:attachment":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=11611"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=11611"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=11611"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}