{"id":71051,"date":"2023-04-12T14:53:10","date_gmt":"2023-04-12T18:53:10","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=71051"},"modified":"2023-08-30T09:45:01","modified_gmt":"2023-08-30T13:45:01","slug":"push-bombing-mfa-fatigue","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/push-bombing-mfa-fatigue","title":{"rendered":"How to Avoid Account Takeover Risks from Push Bombing and MFA Fatigue Attacks"},"content":{"rendered":"\n
Organizations turn on multi-factor authentication (MFA)<\/a> to secure access to corporate resources and increase their security posture. <\/p>\n\n\n\n IT admins like using push notifications MFA for several reasons. Since most users have smartphones in their pockets at all times, push notifications offer minimal user friction. They are also ubiquitous (admins can enable them across different kinds of resources and endpoints unlike other methods) and offer security against \u201cman in the middle\u201d attacks. <\/p>\n\n\n\n Recently, this trusted security measure has been facing a new kind of attack known as push bombing<\/em> or MFA fatigue<\/em>. Keep reading to learn more about how to reduce your risk.<\/p>\n\n\n\n When an organization uses push MFA, the user is required to approve the login or access request sent to their personal device in the form of a push notification. This is just one way (of many) to verify the user\u2019s identity, but preferred given its UX benefits.<\/p>\n\n\n\n Push bombing is a method where an attacker uses a script or a bot to trigger multiple login attempts with stolen or leaked credentials and trigger a SPAM of multiple push notifications to the user\u2019s mobile device. <\/p>\n\n\n\n Here\u2019s how it works: <\/p>\n\n\n\n Alternatively, an attacker may also contact the user impersonating as an IT admin and convince them to approve the login attempt.<\/p>\n\n\n\n Push attempts are triggered after an attacker gains access to a user’s password. The weaker the password the more likely an attacker is to obtain it through brute force and social engineering techniques. <\/p>\n\n\n\n IT admins can use 探花大神\u2019s password settings to adopt a stronger password policy that meets the following requirements:<\/p>\n\n\n\n Admins should also use password aging<\/a> to reduce risks due to re-use of older, leaked, or stolen credentials that a hacker may have obtained. Here\u2019s what the Password Settings look like in the 探花大神 management portal: <\/p>\n\n\n\n Admins can also use 探花大神\u2019s password manager<\/a> to manage their user\u2019s passwords, which reduces the friction associated with using lengthier passwords with increased security posture. 探花大神 Password Manager eliminates the need to remember a master password thereby reducing the risks due to password leaks or breaches.<\/p>\n\n\n\n Admins can use 探花大神\u2019s account lock-out settings to set a limit for password and Push MFA<\/a> retries. A user\u2019s account will be locked if the user denies a login request sent in Push notification for a specified number of consecutive attempts as determined by the settings. Admins can auto unlock the account after a certain duration to reduce user friction. <\/p>\n\n\n\n Admins can activate mobile biometric<\/a> on Push MFA, so that a user is required to use their fingerprint or face recognition as an additional factor to approve a login request. Here\u2019s a look at what both the admin and user sees during this process:<\/p>\n\n\n\n Admins can leverage 探花大神 Conditional Access<\/a> policies for user portal and SSO application login attempts to restrict access from trusted devices or allow access only from the locations where an employee lives or places of travel. Simply select the Conditional Access option from the platform\u2019s left-side navigation to open Conditional Access settings:<\/p>\n\n\n\n Admins can educate their users to check the application name for which the access request is made or the location from where the request was made before approving the request. <\/p>\n\n\n\n While application name or a granular location information may not always be available, when it is present it will help flag potentially fraudulent access requests.<\/p>\n\n\n\n 探花大神 has added rules to restrict concurrent Push MFA attempts on web application and remote terminal logins to give admins peace of mind. This is enabled for organizations that use Protect Push as MFA, adds a protective layer to login events increasing the security posture with minimal user impact.<\/p>\n\n\n\n Note: This protective measure requires no admin action but admins has the option to balance user experience vs. security posture based on organization needs.<\/em><\/p>\n\n\n\n As reported by Microsoft<\/a>, requiring MFA has been shown to reduce account takeover attacks by 99%. While MFA does offer resistance to attacks, hackers have, unfortunately, found a way to circumvent them with push bombing and MFA fatigue. <\/p>\n\n\n\n So, it\u2019s important for organizations to employ additional precautions such as adding phishing-resistant email tools and filters, educating users on stronger password practices for their personal and work accounts, and implementing stronger security practices to avoid security breaches.<\/p>\n\n\n\n 探花大神 continuously adds new features that increase the security posture of the platform to give IT admins and organizations peace of mind. IT admins can also better protect their organizations by adopting 探花大神 recommendations, starting with enforcing stronger password policies<\/a>.<\/p>\n\n\n\n Ready to experience the ease of 探花大神 for your IT needs?<\/strong><\/p>\n\n\n\nWhat Is Push Bombing and MFA Fatigue?<\/h2>\n\n\n\n
\n
How 探花大神 Protect Helps Admins Combat Attacks <\/h2>\n\n\n\n
Stronger Password Policy<\/h3>\n\n\n\n
\n
<\/figure>\n\n\n\n
<\/figure>\n\n\n\n
Account Lock-Out<\/h3>\n\n\n\n
<\/figure>\n\n\n\n
Mobile Biometric<\/h3>\n\n\n\n
<\/figure>\n\n\n\n
<\/figure>\n\n\n\n
Conditional Access<\/h3>\n\n\n\n
<\/figure>\n\n\n\n
<\/figure>\n\n\n\n
<\/figure>\n\n\n\n
App and Location Information on Push Notifications<\/h3>\n\n\n\n
<\/figure>\n\n\n\n
Blocking Anomalous Push Notifications<\/h3>\n\n\n\n
<\/figure>\n\n\n\n
Avoid Account Takeovers with 探花大神<\/h2>\n\n\n\n