Common Information
Type Value
Value
Multi-Factor Authentication - T1556.006
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may disable or modify multi-factor authentication (MFA) mechanisms to enable persistent access to compromised accounts. Once adversaries have gained access to a network by either compromising an account lacking MFA or by employing an MFA bypass method such as [Multi-Factor Authentication Request Generation](https://attack.mitre.org/techniques/T1621), adversaries may leverage their access to modify or completely disable MFA defenses. This can be accomplished by abusing legitimate features, such as excluding users from Azure AD Conditional Access Policies, registering a new yet vulnerable/adversary-controlled MFA method, or by manually patching MFA programs and configuration files to bypass expected functionality.(Citation: Mandiant APT42)(Citation: Azure AD Conditional Access Exclusions) For example, modifying the Windows hosts file (`C:\windows\system32\drivers\etc\hosts`) to redirect MFA calls to localhost instead of an MFA server may cause the MFA process to fail. If a "fail open" policy is in place, any otherwise successful authentication attempt may be granted access without enforcing MFA. (Citation: Russians Exploit Default MFA Protocol - CISA March 2022) Depending on the scope, goals, and privileges of the adversary, MFA defenses may be disabled for individual accounts or for all accounts tied to a larger group, such as all domain accounts in a victim's network environment.(Citation: Russians Exploit Default MFA Protocol - CISA March 2022)
Details Published Attributes CTI Title
Details Website 2024-11-14 0 Cybersecurity in 2025: Are You Prepared?
Details Website 2024-11-14 0 Master the Cybersecurity Basics and Safeguard Your Digital Life
Details Website 2024-11-14 2 Protecting law firm data and reputation: A guide to cybercrime mitigation | #cybercrime | #infosec | National Cyber Security Consulting
Details Website 2024-11-14 35 New PXA Stealer targets government and education sectors for sensitive information
Details Website 2024-11-14 4 How cybersecurity really works in step by step guide
Details Website 2024-11-14 3 Mobile Device Management for Apple, Android & Beyond
Details Website 2024-11-14 2 Why Open-Source CIAM Solutions Are Essential for Data Security and Privacy
Details Website 2024-11-14 24 Major cyber attacks and data breaches of 2024
Details Website 2024-11-14 0 Why IoT Device Security Matters: Protecting Your Smart Devices
Details Website 2024-11-14 0 I Always Doubted MFA And Now I’m Proven Right
Details Website 2024-11-14 0 Why Cybersecurity in Channel Partnerships Matters More Than Ever?
Details Website 2024-11-14 0 Staying Secure in the AI-powered Cyberworld
Details Website 2024-11-14 0 NIS2 Explained: New Sectors, Enhanced Cybersecurity Requirements, and Stricter Penalties for EU Organizations
Details Website 2024-11-14 4 Vulnerability Analysis on Metasploitable 2 Using Nessus Essentials
Details Website 2024-11-14 34 New PXA Stealer targets government and education sectors for sensitive information
Details Website 2024-11-14 0 Did You Know? Educational Institutions Are Among the Top 5 Targets for Cyber Attacks
Details Website 2024-11-14 3 Understanding HTTPS Downgrade Attacks: A Guide to Intercepting Data with BetterCAP
Details Website 2024-11-14 0 The Modern-Day Gold Rush: Why Cybersecurity is the Key to Protecting Our Digital Wealth
Details Website 2024-11-14 0 Windows 11 Passwordless Shift: Ushering in a New Era of Cybersecurity
Details Website 2024-11-14 0 New Report Shows Maritime Industry’s Higher Appetite for Cyber Risk Compared to Others
Details Website 2024-11-14 0 Scam Wave Alerts Are Your Digital Early Warning System Against the Rising Tide of Scams
Details Website 2024-11-14 0 Fraud network uses 4,700 fake shopping sites to steal credit cards
Details Website 2024-11-13 0 🚨 US Indicts Hackers for $2.5M
Details Website 2024-11-13 0 Cybersecurity Architecture: Why Endpoint Security Is Critical to Safeguarding IT Systems
Details Website 2024-11-13 0 Russia, China and Iran to Continue Influence Ops in Post-U.S. Election Era