Reddit Hack Shows Limits of MFA, Strengths of Security Training

0
260
Reddit Hack Shows Limits of MFA, Strengths of Security Training



The newest hack of a well known firm highlights that attackers are more and more discovering methods round multifactor authentication (MFA) schemes — so staff proceed to be an vital final line of protection.

On Jan. 9, Reddit notified its customers {that a} risk actor had efficiently satisfied an worker to click on on a hyperlink in an electronic mail despatched out as a part of a spearphishing assault, which led to “a web site that cloned the habits of our intranet gateway, in an try to steal credentials and second-factor tokens.” 

The compromise of the worker’s credentials allowed the attacker to sift by means of Reddit’s techniques for a couple of hours, accessing inner paperwork, dashboards, and code, Reddit said in its advisory.

The firm continues to analyze, however there is no proof but that the attacker gained entry to consumer knowledge or manufacturing techniques, Reddit CTO Chris Slowe (aka KeyserSosa) said on a follow-up AMA.

“It is extraordinarily tough to show a detrimental, and in addition why, as talked about, we’re persevering with investigating,” he mentioned. “The burden of proof proper now helps that entry was restricted to exterior of the primary manufacturing stack.”

Reddit is the most recent software program firm to fall prey to a social engineering assault that harvested employees’ credentials and led to a breach of delicate techniques. In late January, Riot Games, the maker of the favored League of Legends multiplayer recreation, introduced it had suffered a compromise “by way of a social engineering assault,” with the risk actors stealing code and delaying the corporate’s capability to launch updates. Four months earlier, attackers efficiently compromised and stole supply code from Take Two Interactive’s Rockstar Games studio, the maker of the Grand Theft Auto franchise, utilizing compromised credentials.

The price of even minor breaches attributable to phishing assaults and credential theft continues to be excessive. In a survey of 1,350 IT professionals and IT safety managers, three-quarters (75%) mentioned that their firm had suffered a profitable electronic mail assault up to now yr, in keeping with the “2023 Email Security Trends” report printed by Barracuda Networks, a supplier of software and knowledge safety. In addition, the typical agency noticed its costliest such assault trigger greater than $1 million in damages and restoration prices.

Still, corporations really feel ready to take care of each phishing and spear-phishing, with solely 26% and 21% of respondents fearing they had been unprepared. That’s an enchancment from the 47% and 36%, respectively, who anxious their corporations had been unprepared in 2019. Concerns over account takeover have turn out to be extra frequent although, the report discovered.

“[W]hile organizations could really feel higher outfitted to stop phishing assaults, they don’t seem to be as ready to take care of account takeover, which is often a by-product of a profitable phishing assault,” the report said. “Account takeover can also be an even bigger concern for organizations with the vast majority of their staff working remotely.”

More Proof That 2FA is Not Enough

To head off credential-based assaults, corporations are shifting to MFA, often within the type of two-factor authentication (2FA), the place a one-time password is shipped by way of textual content or electronic mail. Reddit’s Slowe, for instance, confirmed that the corporate required 2FA. “Yup. It’s required for all staff, each to be used on Reddit as effectively for all inner entry,” he mentioned throughout the AMA.

But methods like MFA fatigue or “bombing” — as seen with final fall’s Uber assault — make getting round 2FA a easy numbers recreation. In that situation, the attackers ship out repeated focused phishing assaults to staff till somebody will get uninterested in the notifications and offers up their credentials and the one-time password token.

Moving to the subsequent stage past 2FA is beginning to occur. Providers of id and entry administration applied sciences, as an illustration, are including extra data round entry requests, such because the consumer’s location, so as to add context that can be utilized to assist decide whether or not entry must be authenticated, says Tonia Dudley, CISO at Cofense, a phishing safety agency.

“Threat actors will all the time search for methods to navigate across the technical controls we implement,” she says. “Organizations ought to nonetheless implement using MFA and proceed to tune the management to guard staff.”

Employees Are Key to Cyber Defense

Ironically, the Reddit hack additionally demonstrates the benefits that worker coaching can ship. The worker suspected one thing was unsuitable after coming into credentials into the phishing web site, and shortly after contacted Reddit’s IT division. That decreased the attacker’s window of alternative and restricted the harm.

“It’s time we cease wanting as staff as a weak point and as a substitute taking a look at them because the energy they’re, or will be, for organizations,” Dudley says. “Organizations can solely tune the technical controls up to now … staff can supply that further context of, ‘this simply does not appear proper.'”

The worker on the middle of the Reddit breach won’t face long-term, punitive motion, however did have all entry revoked till the issue was resolved, Reddit’s Slowe mentioned within the follow-up AMA.

“The drawback, as ever, is that it solely takes one individual to fall for [a phish],” he mentioned, including, “I’m exceedingly grateful the worker, on this case, reported that it occurred once they realized it occurred.”

LEAVE A REPLY

Please enter your comment!
Please enter your name here