Common Information
Type Value
Value
Multi-Factor Authentication - T1556.006
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may disable or modify multi-factor authentication (MFA) mechanisms to enable persistent access to compromised accounts. Once adversaries have gained access to a network by either compromising an account lacking MFA or by employing an MFA bypass method such as [Multi-Factor Authentication Request Generation](https://attack.mitre.org/techniques/T1621), adversaries may leverage their access to modify or completely disable MFA defenses. This can be accomplished by abusing legitimate features, such as excluding users from Azure AD Conditional Access Policies, registering a new yet vulnerable/adversary-controlled MFA method, or by manually patching MFA programs and configuration files to bypass expected functionality.(Citation: Mandiant APT42)(Citation: Azure AD Conditional Access Exclusions) For example, modifying the Windows hosts file (`C:\windows\system32\drivers\etc\hosts`) to redirect MFA calls to localhost instead of an MFA server may cause the MFA process to fail. If a "fail open" policy is in place, any otherwise successful authentication attempt may be granted access without enforcing MFA. (Citation: Russians Exploit Default MFA Protocol - CISA March 2022) Depending on the scope, goals, and privileges of the adversary, MFA defenses may be disabled for individual accounts or for all accounts tied to a larger group, such as all domain accounts in a victim's network environment.(Citation: Russians Exploit Default MFA Protocol - CISA March 2022)
Details Published Attributes CTI Title
Details Website 2024-11-10 0 Solid Security Pro Review
Details Website 2024-11-10 0 Top 5 Cybersecurity Best Practices Every Business Should Follow
Details Website 2024-11-10 0 Building a Resilient Cloud: Essential AWS Security Services Explained
Details Website 2024-11-10 2 Go Without MFA or Data Backups: Which is Worse? | Grip
Details Website 2024-11-10 1 Understanding Cybersecurity: How to Protect Yourself from Online Threats in 2024
Details Website 2024-11-10 1 Alphabay’s Growing Influence on the Dark Web: What You Need to Know
Details Website 2024-11-10 1 The Top 10 Dark Web Marketplaces in 2024: An Insight into Hidden Online Platforms
Details Website 2024-11-10 0 Modern Authentication Overview and Use Cases
Details Website 2024-11-09 19 TRACKING RANSOMWARE : OCTOBER 2024 | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
Details Website 2024-11-09 0 One Reset Away from Ruin: The Hidden Threat in Your Inbox
Details Website 2024-11-09 0 Insider Threats: The Hidden Dangers Within Your Organization
Details Website 2024-11-09 1 Rudiments of Cyber Security: The CIA Triad
Details Website 2024-11-09 0 Access, and why you need less of it..
Details Website 2024-11-09 0 Zero-Trust Cybersecurity Frameworks in Academia: Protecting Research and Data in the Digital Age
Details Website 2024-11-09 0 The Role of Cybersecurity in Business Trust and Growth
Details Website 2024-11-09 0 Spy-Curious About Security?
Details Website 2024-11-09 0 The Symbiotic Relationship Between Cybersecurity Frameworks and Controls
Details Website 2024-11-08 0 Cloud Security Best Practices
Details Website 2024-11-08 0 Zero Trust Architecture: The Cybersecurity Revolution Redefining Trust
Details Website 2024-11-08 0 STRIDE-Threat Modelling Methodology
Details Website 2024-11-08 5 The Impact of Global Malware Attacks on Cybersecurity Strategies
Details Website 2024-11-08 0 New Healthcare Cybersecurity Bill Introduced: HISAA Explained | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
Details Website 2024-11-08 5 Cybersecurity News Review — Week 45
Details Website 2024-11-08 0 Did London Drugs cyber attack help prep other BC retailers? | #cybercrime | #infosec | National Cyber Security Consulting
Details Website 2024-11-08 0 Google To Make MFA Mandatory for Google Cloud in 2025