Strengthened protection through multi-factor identification
In the digital age, securing online accounts has become paramount. One of the most common methods for ensuring this security is through One-Time Passwords (OTPs), which are provided to users after they have authenticated with the correct combination of username and password. Traditional methods of OTP delivery include hardware tokens, TAN generators for online banking, and SMS passcodes.
However, these methods are not foolproof. Tools like Modlishka, a phishing tool that allows for the creation of phishing sites, the capture of login credentials, and the bypassing of two-factor authentication, can exploit the real-time forwarding capability of MFA, making MFA alone insufficient against such sophisticated tools.
Multi-factor authentication (MFA), which requires at least one additional factor for successful login beyond the username and password, offers protection against many threats. It can provide added security by using additional factors such as PIN, biometric features, geofencing, limiting to IP address ranges, and unusual user behavior. MFA also guarantees protection against password spraying, a targeted form of attack where common passwords are tried on a large number of user accounts.
Despite these benefits, MFA is not a panacea. Attackers often use Credential Stuffing, a method where stolen login credentials are tested for validity, bypassing the need for strong passwords. Additionally, tools like Modlishka can potentially bypass session-based OTPs, although this is unclear.
Microsoft, in a blog post titled "Your Pa$$word doesn't matter" by Alex Weinert, Microsoft's identity protection program lead, advises relying on two-factor or multi-factor authentication instead of focusing on password rules. The company recommends using a password of more than 8 characters, including special characters and numbers, and avoiding passwords related to your name and/or login or characters that are next to each other on the keyboard. A password manager app can help generate and remember complex passwords.
It's also important to note that three out of the four most common attack methods are not affected by the length and complexity of the password. Keystroke logging or malware sniffing, which captures and transmits keyboard inputs, including login credentials, can be mitigated by the use of OTPs, as these change with each login.
In conclusion, while MFA adds a layer of security, it is not a standalone solution. Users should still practice good password hygiene and be aware of phishing and man-in-the-middle attacks. Newer and secure methods for two-factor authentication, such as push notifications and soft tokens, offer high usability and can further enhance security.