Despite the widespread adoption of Multi-Factor Authentication (MFA), stories about its failure to secure accounts continue to circulate. However, it’s crucial to understand that in most scenarios, MFA isn’t being bypassed; rather, it’s often a case of misconfiguration.
A common mistake is configuring MFA to request the second authentication factor on a delayed basis, typically within a 4 to 8-hour window. This means a user could log into their email in the morning, complete both authentication steps, and then not be prompted for the second factor for the rest of the working day. This setup becomes particularly risky if there’s no adaptive security measure in place to detect unusual access attempts, such as logins from a foreign country or through an unfamiliar browser. In essence, this configuration dilutes MFA back to a single-factor system, significantly increasing the risk of account compromise.
Here’s a step-by-step breakdown of a typical account compromise scenario:
Recent Examples of BEC Attacks
The rise in BEC attacks has been alarmingly swift, with nefarious email impersonations accounting for nearly 99% of all reported threats. According to a Tripwire report, BEC scams have skyrocketed, showing an 81% increase in 2022 alone, with adjusted annual losses amounting to $2.7 billion, significantly overshadowing the financial impact of ransomware.
Microsoft’s Cyber Signals report highlights a 38% increase in cybercrime as a service (CaaS) targeting business emails between 2019 and 2022, indicating a surge in sophisticated BEC schemes. The use of platforms like BulletProftLink for creating industrial-scale malicious mail campaigns underscores the evolving tactics of BEC operators, who now leverage residential IP addresses to mask their activities and evade detection.
To mitigate the risk of such compromises, consider the following strategies:
Cyvatar’s Technical Remediation to Prevent BEC
At Cyvatar, we understand that combating BEC requires more than just traditional defenses. We leverage cutting-edge technology and bespoke strategies to protect our clients:
Cyvatar is committed to providing businesses with the most advanced and effective defense mechanisms against BEC. Through our comprehensive approach, combining employee education, policy adjustments, and state-of-the-art technological solutions, we empower our clients to protect their assets and maintain their integrity in the digital world. Protecting your business from BEC is an ongoing process that requires vigilance, innovation, and the right partner. Cyvatar is here to secure your digital journey every step of the way. As BEC attacks continue to evolve and become more sophisticated, the importance of adopting a proactive and comprehensive cybersecurity posture cannot be overstated.
The recent examples of BEC attacks, as reported by sources like Tripwire and Microsoft, illustrate the complexity and adaptability of cybercriminals. These incidents not only highlight the financial implications but also reveal the psychological tactics employed by attackers to manipulate their targets. Cybercriminals leverage social engineering, exploiting trust and exploiting the routine nature of email communications to orchestrate their scams. This reality necessitates a shift in how organizations perceive email security, urging a move beyond conventional antivirus and email security tools towards more advanced solutions capable of detecting and mitigating nuanced threats.
Cyvatar’s approach to combating BEC involves not just technological solutions but also a strong emphasis on the human element. Education and awareness are pivotal. By training employees to recognize the signs of a BEC attempt, organizations can significantly reduce the risk of successful attacks. Furthermore, our technical remediation strategies are designed to adapt to the shifting landscape of cyber threats. Our advanced email security solutions, anomaly detection systems, and comprehensive SIEM implementations represent the frontline defense against BEC, but they are complemented by our commitment to ongoing vulnerability assessments and penetration testing to ensure that defenses remain robust against emerging threats.
By understanding the vulnerabilities within MFA configurations and adopting comprehensive security practices, organizations can significantly reduce the risk of Business Email Compromise (BEC) and protect their assets more effectively.
Circa Las Vegas
Thurs. Aug 5th
Cybersecurity Reunion Pool Party at BlackHat 2021