Don't mind me, just installing android devkit on work Mac so the mandatory mfa program, which is only available for phones, can be somewhere that's very locked off #microsoftAuthenticator #is #scrapcode
Don't mind me, just installing android devkit on work Mac so the mandatory mfa program, which is only available for phones, can be somewhere that's very locked off #microsoftAuthenticator #is #scrapcode
Duo vs Microsoft Authenticator: Which Tool Is Better? – Source: www.techrepublic.com https://ciso2ciso.com/duo-vs-microsoft-authenticator-which-tool-is-better-source-www-techrepublic-com/ #rssfeedpostgeneratorecho #twofactorauthentication #microsoftauthenticator #SecurityonTechRepublic #SecurityTechRepublic #CyberSecurityNews #Authenticator #CloudSecurity #Security #duo
@_r_netsec : Alex Weinert (Identity Security VP at Microsoft) already knew about this in 2019.
His recommendation: just keep using Microsoft Authenticator...
From https://redmondmag.com/Articles/2024/10/22/Microsoft-Tweaks-Authenticator.aspx:
❞
Compliance with the FIPS 140 means organizations that use Authenticator meet the requirements of the Biden administration's Executive Order 14028, which requires government agencies to use phishing-resistant authentications.
❝
That is total nonsense. FIPS 140 is about cryptography, which -definitely in this case- has nothing to do with phishing resistance.
In fact, the original article (https://techcommunity.microsoft.com/t5/microsoft-entra-blog/the-latest-enhancements-in-microsoft-authenticator/ba-p/4078807) does not make that mix-up.
Unless software checks whether https is used and the domain name shown in de browser's address bar is correct, MFA is *not* phishing resistant.
In *2019*, Alex Weinert of Microsoft wrote in https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/all-your-creds-are-belong-to-us/ba-p/855124:
«
MFA had failed.
[...]
All Authenticators Are Vulnerable
[...]
»
Today, as echoed in https://www.bleepingcomputer.com/news/microsoft/microsoft-enable-mfa-or-lose-access-to-admin-portals-in-october/, Microsoft still insists that using weak MFA is a good idea.
In https://azure.microsoft.com/en-us/blog/announcing-mandatory-multi-factor-authentication-for-azure-sign-in/ Microsoft writes (on August 15):
«
As recent research [1] by Microsoft shows that multifactor authentication (MFA) can block more than 99.2% of account compromise attacks, making it one of the most effective security measures available, today’s announcement brings us all one step closer toward a more secure future.
»
From that same article, "solutions" with (nearly as weak as SMS) "Microsoft Authenticator" is at the TOP of their list:
«
Organizations have multiple ways to enable their users to utilize MFA through Microsoft Entra:
• Microsoft Authenticator [...]
• FIDO2 security keys [...]
• Certificate-based authentication [...]
• Passkeys [...]
• Finally, and this is the least secure version of MFA, you can also use a SMS or voice approval [...]
»
From [1] (PDF) = https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RW166lD?culture=en-us , no date of the "investigation period" to be seen *anywhere*, and one of the authors being Alex Weinert, more extreme percentages (approved by Microsoft's marketing dept):
«
Our findings reveal that MFA implementation offers outstanding protection, with over 99.99% of MFA-enabled accounts remaining secure during the investigation period. Moreover, MFA reduces the risk of compromise by 99.22% across the entire population and by 98.56% in cases of leaked credentials.
»
Dear reader: please stop buying Microsoft BS that completely ignores PhaaS.
To name a few examples:
"Experts agree [*] that setting up two-factor authentication (2FA) İs one of the most powerful ways to protect your account from getting hacked. However, hackers like COLDRIVER and COLDWASTREL may try to trick you into entering your second factor; we have seen attackers successfully compromise a victim who had enabled 2FA." - (PDF) https://www.accessnow.org/wp-content/uploads/2024/08/Spearphishing-cases-in-Eastern-Europe-2022-2024-technical-brief.pdf
[*] Not me. My tip is here: https://infosec.exchange/@ErikvanStraten/112724966066248808
EvilGinx2: "Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication" - https://github.com/kgretzky/evilginx2 (there are more, like Modlishka, Muraena, CredSniper, EvilProxy (Phaas), NakedPages etc.)
Not even a fake website needed: https://www.bleepingcomputer.com/news/security/new-greatness-service-simplifies-microsoft-365-phishing-attacks/
From https://mrd0x.com/attacking-with-webview2-applications/:
«
Bypass 2FA
WebView2 also provides built-in functionality to extract cookies. This allows an attacker to extract cookies after the user authenticates into the legitimate website. This technique removes the need of having to spin up Evilginx2 or Modlishka but the obvious trade-off is that the user must execute the binary and authenticate.
»
In addition, from https://www.bleepingcomputer.com/news/security/clever-phishing-method-bypasses-mfa-using-microsoft-webview2-apps/:
«
"Yubikeys can't save you because you're authenticating to the REAL website not a phishing website."
mr.d0x
»
AND:
«
However, as mr.d0x admits and Microsoft pointed out in their response to our questions, this attack is a social engineering attack and requires a user to run a malicious executable.
»
Correct, but a local compromise does'nt protect you when you're using FIDO2 hardware keys or passkeys.
From 2022: https://microsoft.com/en-us/security/blog/2022/07/12/from-cookie-theft-to-bec-attackers-use-aitm-phishing-sites-as-entry-point-to-further-financial-fraud/:
«
A large-scale phishing campaign that used adversary-in-the-middle (AiTM) phishing sites stole passwords, hijacked a user’s sign-in session, and skipped the authentication process even if the user had enabled multifactor authentication (MFA).
»
"Phishing with Cloudflare Workers: Transparent Phishing and HTML Smuggling" - https://www.netskope.com/blog/phishing-with-cloudflare-workers-transparent-phishing-and-html-smuggling
"New EvilProxy Phishing Service Allowing Cybercriminals to Bypass 2-Factor Security" - https://thehackernews.com/2022/09/new-evilproxy-phishing-service-allowing.html
From https://www.europol.europa.eu/media-press/newsroom/news/international-investigation-disrupts-phishing-service-platform-labhost:
«
The investigation uncovered at least 40 000 phishing domains linked to LabHost, which had some 10 000 users worldwide.
[...]
LabRat was designed to capture two-factor authentication codes and credentials, allowing the criminals to bypass enhanced security measures.
»
"Security and Privacy Failures in Popular 2FA Apps" by Gilsenan et al. (USENIX 2023): https://www.usenix.org/conference/usenixsecurity23/presentation/gilsenan
The PDF can also be found here: https://github.com/blues-lab/totp-app-analysis-public (Aegis was one of the least problematic apps, and don't use Authy).
This is what is wrong with weak MFA/2FA:
You
o
/|\ [device + browser]
/ \ |
v
[login.microsoftonline-aitm.com]
|
v
[login.microsoftonline.com]
(no thanks to DV-certificates).
6 Best Authenticator Apps for 2024 – Source: www.techrepublic.com https://ciso2ciso.com/6-best-authenticator-apps-for-2024-source-www-techrepublic-com/ #rssfeedpostgeneratorecho #microsoftauthenticator #SecurityonTechRepublic #SecurityTechRepublic #GoogleAuthenticator #CyberSecurityNews #CloudSecurity #Security #2FA #MFA
Patch Tuesday, March 2024 Edition – Source: krebsonsecurity.com https://ciso2ciso.com/patch-tuesday-march-2024-edition-source-krebsonsecurity-com/ #rssfeedpostgeneratorecho #microsoftauthenticator #CyberSecurityNews #KrebsonSecurity #KrebsOnSecurity #MicrosoftAzure #ImmersiveLabs #SecurityTools #SatnamNarang #TimetoPatch #KevinBreen #Automox #Tenable
Patch Tuesday, March 2024 Edition - Apple and Microsoft recently released software updates to fix dozens of security h... https://krebsonsecurity.com/2024/03/patch-tuesday-march-2024-edition/ #adobeexperiencemanager #microsoftauthenticator #coldfusion2023and2021 #adobeaiassistant #adobepremierpro #cve-2024-21334 #cve-2024-21390 #cve-2024-21433 #cve-2024-21435 #cve-2024-21437 #cve-2024-23225 #cve-2024-23296 #cve-2024-26170 #cve-2024-26182 #microsoftazure #securitytools #immersivelabs
@Blort @kitten_tech so i could use #calyxos whilst still using #MicrosoftAuthenticator (for work)?
@Erased_Citizen I regard it as Microsoft's equivalent of ed(1) in its error handling.
It's sole failure modes are either sit and wait for ever or timeout with no clue given as to what went wrong. And in several places Microsoft's applications won't tell the user that it's even waiting for Authenticator, but will just show a progress bar or a spinning mouse pointer.
I count my lucky stars that it's someone else's job at my company to manage it.
@Erased_Citizen Easily, if my experience is any guide.
Just requiring Microsoft Authenticator for two logins on two different machines simultaneously is enough to make it fail both of them. And if it's something like RDP where it automatically re-tries 5 times after a network outage, and you had about 6 sessions going, it's a long road back to where it will authenticate again.
The worst of it was #MicrosoftAuthenticator. Do not use this app!
Firstly, you can only backup and restore your accounts by linking your workplace account with a personal account. What?
Secondly, having done that and completed the backup and restore, you discover that 'for security reasons' all the accounts are disabled pending confirmation from a QR code.
Given that this is not much easier than deleting and starting again, I have instead migrated those accounts to Google Authenticator.
Tras lanzar las preguntas hace unos días, este fin de semana he decidido probar un par de aplicaciones de verificación en dos pasos.
Venía de usar #MicrosoftAuthenticator cuando usaba #iOS + #Windows, y fui al Keychain de Apple cuando pasé a #iOS + #macOS. Sin embargo, viniendo de estas dos alternativas, las opciones que ofrecen las apps especializadas de terceros es como dar un salto de ciencia ficción al futuro.
Primero utilicé #Bitwarden, porque es la que más recomendabais vosotros y en casi todos los sitios donde investigué. En el iPhone va sin problemas y además es gratis, pero no me terminó de convencer en el Mac porque había que hacer clicks en los campos de contraseñas para que te las muestre.
Luego probé #1Password, con su trial de 15 días gratis, y es absolutamente maravilloso. Se integra en iOS y macOS igual que el Keychain de Apple, pero es mil veces más completa, más organizable, y tiene sistema de verificación en dos pasos. Es algo cara, pero creo que me la quedaré.
Microsoft Authenticator App for Apple Watch is no longer available
https://www.onmsft.com/news/authenticator-app-apple-watch-not-available/
#MicrosoftAuthenticator #Apple #News #iOS
How to Move Microsoft Authenticator App to a New Phone
https://www.onmsft.com/how-to/move-microsoft-authenticator-app-to-a-new-phone/
#MicrosoftAuthenticator #How-To
So my good friend #MicrosoftAuthenticator has started lagging like mad on iOS and on android forcing me to double authenticate. Great work everyone.
Microsoft Authenticator is set to cut support for the Apple watch in January
https://www.onmsft.com/news/authenticator-app-not-supported-apple-watch
#MicrosoftAuthenticator #News #iOS
Please activate 2 factor authentication #2FA. You can either use an app like #GoogleAuthenticator or #MicrosoftAuthenticator or a hardware dongle like the #YubiKey or the #NitroKey. Best probably is to use the hardware key and have the app as backup. Thanks for helping to make this Mastodon instance a safer place.