Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Dallas/Fort Worth area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

With Phishing Attacks Beating 2FA, You Need to Be Able to Spot Them

With Phishing Attacks Beating 2FA, You Need to Be Able to Spot Them

Unfortunately, one of the most effective defenses against phishing attacks has suddenly become a lot less dependable. This means that you and your users must be ready to catch these attempts instead. Here, we’ll review a few new attacks that can be included in a phishing attempt, and how you and your users can better identify them for yourselves.

How Has Two-Factor Authentication (2FA) Been Defeated?

There are a few different methods that have been leveraged to bypass the security benefits that 2FA is supposed to provide.

On a very basic level, some phishing attacks have been successful in convincing the user to hand over their credentials and the 2FA code that is generated when a login attempt is made. According to Amnesty International, one group of hackers has been sending out phishing emails that link the recipient to a convincing, yet fake, page to reset their Google password. In some cases, fake emails like this can look very convincing, which makes this scheme that much more effective.

As Amnesty International investigated these attacks, they discovered that the attacks were also leveraging automation to automatically launch Chrome and submit whatever the user entered on their end. This means that the 30-second time limit on 2FA credentials was of no concern.

In November 2018, an application on a third-party app store disguised as an Android battery utility tool was discovered to actually be a means of stealing funds from a user’s PayPal account. To do so, this application would alter the device’s Accessibility settings to enable the accessibility overlay feature. Once this was in place, the user’s clicks could be mimicked, allowing an attacker to send funds to their own PayPal account.

Another means of attack was actually shared publicly by Piotr Duszyński, a Polish security researcher. His method, named Modlishka, creates a reverse proxy that intercepts and records credentials as the user attempts to input them into the impersonated website. Modlishka then sends the credentials to the real website, concealing its theft of the user’s credentials. Worse, if the person leveraging Modlishka is present, they can steal 2FA credentials and quickly leverage them for themselves.

How to Protect Yourself Against 2FA Phishing

First and foremost, while it isn’t an impenetrable method, you don’t want to pass up on 2FA completely, although some methods of 2FA are becoming much more preferable than others. At the moment, the safest form of 2FA is to utilize hardware tokens with U2F protocol.

Even more importantly, you need your entire team to be able to identify the signs of a phishing attempt. While attacks like these can make it more challenging, a little bit of diligence can assist greatly in preventing them.

When all is said and done, 2FA fishing is just like regular phishing… there’s just the extra step of replicating the need for a second authentication factor. Therefore, a few general best practices for avoiding any misleading and malicious website should do.

First of  all, you need to double-check and make sure you’re actually on the website you wanted to visit. For instance, if you’re trying to access your Google account, the login url won’t be www - logintogoogle - dot com. Website spoofing is a very real way that (as evidenced above) attackers will try to fool users into handing over credentials.

There are many other signs that a website, or an email, may be an attempt to phish you. Google has actually put together a very educational online activity on one of the many websites owned by Alphabet, Inc. Put your phishing identification skills to the test by visiting https://phishingquiz.withgoogle.com/, and encourage the rest of your staff to do the same!

For more best practices, security alerts, and tips, make sure you subscribe to our blog, and if you have any other questions, feel free to reach out to our team by calling (800) 588-4430.

Comments

 
No comments yet
Already Registered? Login Here
Guest
Saturday, 15 August 2020
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation
 

Tag Cloud

Security Tip of the Week Technology Business Computing Cloud Best Practices Hackers Malware Privacy Business Email Productivity Hosted Solutions Network Security Microsoft Productivity Software Internet IT Services Windows 10 Computer Innovation Managed Service Provider Backup Data Backup Mobile Devices Ransomware Business Continuity Outsourced IT Hardware Smartphone Data Android Efficiency Upgrade Google Disaster Recovery Social Media Managed IT services User Tips Data Recovery Communication IT Support Workplace Tips IT Support Browser Small Business Business Management Cloud Computing Managed IT Services Data Management Smartphones App Server Holiday Microsoft Office Cybersecurity Network Internet of Things Office Remote Monitoring Phishing Miscellaneous Office 365 Windows Password Facebook VoIP Paperless Office communications WiFi Tech Term Artificial Intelligence Gmail Big Data Save Money Encryption Spam Collaboration Passwords Employer-Employee Relationship Document Management Risk Management Vendor Management Compliance Unified Threat Management Bandwidth Firewall Robot Apps Saving Money Hosted Solution Recovery Wi-Fi Customer Relationship Management Windows 10 Healthcare Tip of the week Analytics Managed Service Apple Avoiding Downtime Word Hacker Mobile Device Management Customer Service Operating System How To Content Filtering Windows 7 Government Remote Computing Money Downtime Work/Life Balance Infrastructure Managed IT Office Tips Chrome File Sharing Two-factor Authentication Settings Health Automation The Internet of Things Going Green Computers Vulnerability Alert Hacking Help Desk Mobile Computing Printing Data Security Data storage Tech Support Applications Meetings Computing Storage Education Software as a Service IT Management Cybercrime Virtual Reality Training Mobile Device Antivirus Redundancy Business Growth SaaS Presentation BYOD Social Project Management Data loss Website BDR Outlook Business Technology Telephone Systems LiFi Retail Twitter Laptops Monitors Best Practice Politics Travel Solid State Drive Lithium-ion battery Patch Management Business Owner Scam Identity Theft Google Drive Websites Physical Security Augmented Reality Regulations Marketing Taxes IBM Electronic Health Records Running Cable Botnet VPN Net Neutrality Assessment Samsung Proactive Competition Server Management Licensing Smart Technology Bring Your Own Device Search Virtual Private Network Consultation Digital Payment Sports Remote Monitoring and Management HIPAA Information Technology IT service Maintenance Cortana Router Humor Virtualization Mobile Security Computer Care Administration Analyitcs IT solutions Safety Wireless Technology Time Management Tablet Automobile Upgrades Wireless Mobility Budget End of Support Specifications Access Control Mouse IoT YouTube Unified Communications User Legal Display Uninterrupted Power Supply Mobile Data Monitoring iPhone Hacks RMM Shortcut Fort Worth Superfish Blockchain Spyware Wires Business Telephone business communications systems Staff Multi-Factor Security Consulting Current Events Procurement flu shot Hard Drives Permissions G Suite How To Processors Laptop Cost Management Active Directory Virtual Desktop Biometric Internet Protocol Flexibility Heating/Cooling Google Calendar Motion Sickness Hard Disk Drive Remote Worker Fort Worth IT Windows Server Refrigeration Networking Fraud Firefox Supercomputer Halloween Google Docs Hard Drive Writing MSP VoIP streamlines Operations PowerPoint Servers Legislation Deep Learning Personal Information Fun Social Networking Professional Services DFW IT Service Recycling User Management Consumers IT Consultant IT Budget Scary Stories Social Engineering business network infrastructure Wearable Technology Cyberattacks Machine Learning Computer Repair Motherboard Virtual Assistant Management Batteries Undo Techology Internet Exlporer Cleaning Notifications eWaste IP Address Bookmarks Statistics Relocation Software Tips Mail Merge Distributed Denial of Service IT Sevices Webcam Alt Codes Electronic Medical Records Google Wallet Voice over Internet Protocol Enterprise Resource Planning Remote Work Disaster Resistance data services Crowdsourcing Dark Data Private Cloud WPA3 Environment Mobile Office IT Technicians Favorites Bluetooth Technology Tips Address Managed IT Service Point of Sale Corporate Profile Typing Drones Modem Buisness Mobile File Management Proactive IT Hotspot Quick Tips User Error Error History Fleet Tracking Troubleshooting Mirgation Conferencing Comparison Break Fix WannaCry Cryptocurrency Knowledge Cookies Manufacturing Company Culture Telephone IT Consulting Language Printer Cabling Asset Tracking Migration Employees Phone System Black Friday Dark Web Web Server Bitcoin Update Staffing Experience Nanotechnology Gadgets Vulnerabilities Mobile VoIP Data Breach Computing Infrastructure Network Management Administrator 3D Printing Remote Workers Chatbots Zero-Day Threat Cyber Monday Data Warehousing Cameras VoIP Windows 8 Chromebook GPS Proactive Maintenance Network Congestion Geography Windows Server 2008 Domains Technology Laws Alerts Touchscreen SharePoint Law Enforcement Google Maps Disaster Unsupported Software Information 5G Identity Backup and Disaster Recovery Entrepreneur flu season Application Lenovo Microsoft Excel CCTV Digital Emoji Tracking Utility Computing Processor Users Cables Co-Managed IT Public Speaking Unified Threat Management Cooperation Downloads Gadget

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code