
As a result, it’s clear that putting employees through user awareness training isn’t enough. The incidents underscore the fact that many phishing attacks today are “pretty convincing,” said Rachel Tobac, CEO of SocialProof Security, which focuses on training around social engineering threats. And in the case of the Twilio attack this summer, employees most likely entered a one-time passcode into a fake login site - allowing the attackers to break through MFA and access data from at least 125 Twilio customers. In the breach of Uber in September, for instance, an attacker posing as an IT staffer convinced a contractor to approve a login push notification, allowing the attacker to bypass Uber’s MFA requirement. But while any type of MFA is better than nothing, “now we’re starting to see that attackers are finding ways around it,” Murphy said. There was a time a few years ago when multifactor authentication was seen as a “silver bullet” for stopping many types of credential-based intrusions, said Bryan Murphy, a senior director at identity security vendor CyberArk. Unfortunately, many enterprises that’ve adopted MFA are still not in the clear. And there’s still a long way to go to make that practice common: Microsoft said recently that just 22% of Azure Active Directory identities are secured with MFA. 1 to preventing security breaches, as annoying or inconvenient as it might be sometimes.
#Yubico authenticator verification
Requiring a second form of verification for a user to log in - known as multifactor authentication - continues to be recommended as step No. But they’re not sufficient, since password-only authentication remains a massive risk for businesses. It’s still true: Rotating passwords and choosing complex passwords that are unique to each account are good cybersecurity practices for anyone. “And the inverse is also true: If you get it wrong, you’re opening yourself up to all kinds of attacks.” Stronger authentication “If you can get identity right, you’re protecting yourself from all attacks, at some level,” McKinnon said. The adoption of an identity threat detection tool is worth considering, as is technology for helping to secure the use of unmanaged applications, or “shadow IT,” experts said.įocusing on identity is critical because today, “all attacks become identity-based attacks” at some stage of the incident, said Todd McKinnon, co-founder and CEO of widely used identity platform Okta. Meanwhile, given the inevitably of breaches using credentials, getting improved visibility into IT environments is key.

“Identity has become that first level of defense. In response, mid-sized and large enterprises should explore deploying stronger authentication and make authorization technology - which includes access and permissions controls - a bigger focus of their cybersecurity strategy, industry analysts and executives told Protocol. Stolen credentials are also now widely available for purchase on the dark web, fueling the surge in identity-based attacks. And that’s a massive shift.”īreaches involving usernames and passwords jumped 35% in 2021 alone, identity management and security vendor ForgeRock recently reported.


In today’s enterprise, “identity and security are very merged,” said Vasu Jakkal, corporate vice president for security, compliance, identity, management, and privacy at Microsoft. While the theft of passwords and other credentials has long been a part of the hacker playbook, identity-based attacks have risen to the forefront with so many employees now working outside of a corporate network firewall.

Illegitimate use of credentials was responsible for 48% of breaches in 2021 - by far the largest vehicle for breaches - up from 37% in 2017, according to data provided by Verizon to Protocol. From the SolarWinds and Colonial Pipeline cyberattacks to the latest attacks against Twilio and Uber, a common thread runs through many of the high-profile breaches in recent years: The attackers succeeded by targeting identity credentials.Īnd all those breaches that you didn’t hear as much about? Chances are that those involved credentials, too.
