Ukrainian Foreign Ministry calls on Hungary to stop demonizing Ukraine and Zelenskyy https://www.byteseu.com/1094479/ #Hungary #MFA
Ukrainian Foreign Ministry calls on Hungary to stop demonizing Ukraine and Zelenskyy https://www.byteseu.com/1094479/ #Hungary #MFA
Cisco Talos ostrzega: cyberprzestępcy coraz skuteczniej omijają uwierzytelnianie wieloskładnikowe (MFA)
Uwierzytelnianie wieloskładnikowe (MFA), przez lata uważane za skuteczne zabezpieczenie przed phishingiem, staje się coraz mniej pewną barierą.
Eksperci z grupy Cisco Talos informują, że cyberprzestępcy opracowali zaawansowane techniki pozwalające na obchodzenie tego mechanizmu, co zmusza organizacje do ponownego przemyślenia swoich strategii bezpieczeństwa.
„Cyberprzestępcy coraz częściej potrafią ominąć mechanizmy MFA” – mówi Thorsten Rosendahl z Cisco Talos. „Obserwujemy wyraźny wzrost liczby ataków typu adversary-in-the-middle. To oznacza, że firmy nie mogą już polegać wyłącznie na dotychczasowych, sprawdzonych środkach ochrony – muszą ponownie je przemyśleć i dostosować”.
Jak działają ataki nowej generacji?
Cisco Talos zwraca uwagę na kilka kluczowych technik i narzędzi wykorzystywanych przez cyberprzestępców:
Jak się bronić?
Eksperci z Cisco Talos podkreślają, że kluczowa jest obecnie odpowiednia prewencja i inwestycja w trwałe oraz odporne metody uwierzytelniania. Jednym z najbardziej obiecujących rozwiązań jest WebAuthn – standaryzowana, bezhasłowa metoda uwierzytelniania oparta na kryptografii klucza publicznego. W tej wersji MFA, klucze kryptograficzne są powiązane z oryginalną domeną witryny, co praktycznie uniemożliwia ich podrobienie przez fałszywe strony czy serwery proxy. Mimo to, WebAuthn jest wciąż rzadko stosowane w firmach.
Cisco Talos zaleca organizacjom ponowną ocenę swoich strategii MFA i oferuje wsparcie w dostosowaniu ich do nowych wyzwań, od analizy sieci IT po kompleksowe architektury bezpieczeństwa w modelu Zero Trust.
@noelreports
#UkraineKriegRussisches Außenministerium #MFA bedient sich erneut #Goebbels-Rhetorik
(3/3)
... Seite zu prüfen, & der Prozess der Überführung von 6.000 Leichen werde bald beginnen."
#GeorgeOrwell wäre von diesem #NewSpeak nicht überrascht gewesen--schliesslich schrieb er nicht umsonst #1984 über die #Sowjetunion.
Gibt es außerhalb Russlands & außerhalb rechtsextremistischer Bubbles noch halbwegs informierte Leute, die diese propagandistischen Exkremente noch glauben?!?
Russisches Außenministerium #MFA bedient sich erneut #Goebbels-Rhetorik
(2/n)
...Anstrengungen unternommen, um die nächste Runde der #Istanbuler Verhandlungen zum Scheitern zu bringen, und dabei ihre "typischen terroristischen Methoden" eingesetzt.
Sie warf der #Ukraine vor, eine aggressive Haltung gegenüber #Russland einzunehmen und pragmatische Lösungen zu vermeiden.
. [
]
Beide Seiten seien jedoch dabei, die Memoranden der jeweils anderen...
Russisches Außenministerium #MFA bedient sich erneut #Goebbels-Rhetorik
(1/n)
#Russland, welches 2014 und 2022 die #Ukraine, davor u. a. #Georgien und #Tschetschenien überfallen hat, beschuldigt das sein völkerrechtlich verbrieftes Recht auf #Selbstverteidigung ausübendes Land der "Agression" und des "Terrorismus'":
Von @noelreports:
" Die Sprecherin des Außenministerius, #MariaZakharova, erklärte, die #Ukraine habe erhebliche...
In case you need a reminder to setup Multi-factor Authentication, #MFA, on your accounts. Here are all the attempts to login to my Microsoft account on Friday, May 30th!
Natürlich kann man auch vorbeugen, beispielsweise durch verantwortungsvollen Umgang mit Passwörtern.2FA
Dinge, die heute selbstverständlich sein sollten, wie
* eindeutige Passwörter
* ein Passwortmanager dafür
* Nutzung von Zwei-Faktor-Authentifizierung, insbesondere für Mailkonten!
#2FA #MFA
https://marcel-waldvogel.ch/2020/04/22/sicherheitstipps-nicht-nur-fuers-homeoffice/
Make TOTP 2FA/MFA setup slightly more user-friendly
You can also put OTP secrets into links to allow users to set up OTP with one single click without a QR code scan nor manual copying of a secret!
https://www.sindastra.de/p/3567/make-totp-2fa-mfa-setup-slightly-more-user-friendly
184 MILLION passwords exposed — major data breach alert
A newly uncovered unprotected database has leaked credentials for Google, Microsoft, Facebook, Apple, financial accounts, and even government portals.
Highlights: Plaintext — no encryption or password protection
Threats include credential stuffing, identity theft, corporate espionage, ransomware, and phishing
Action steps:
・Use a password manager
・Use complex, unique passwords
・Enable multi-factor authentication (MFA)
・Check if your data was leaked (e.g., HaveIBeenPwned)
・Deploy strong security software
We can’t control every breach, but we can control our defenses. Stay vigilant, stay protected.
@molly0xfff
Choose at least 2 of these different factors:
Tsja..... "Tegelijkertijd legt het rapport de vinger op zere plekken. Zo had de TU/e weliswaar multifactorauthenticatie op de meeste applicaties, maar nog niet op de log-in van het VPN. Dat stond in de planning voor de eerste helft van 2025. "
https://www.tue.nl/nieuws-en-evenementen/nieuwsoverzicht/19-05-2025-tue-handelde-goed-bij-cyberaanval-maar-er-zijn-ook-leerpunten
#cybersecurity #TUe #mfa
Is MFA authenticator anxiety a thing? Is there a name for it?
I always have enough time when I open the authenticator app and put in the code before it times out, but I still get nervous that I will run out of time before the new number appears.
Is there a name for that type of feeling?
Even a 36-character password wasn't enough to stop a determined attacker. Here's what saved my Microsoft account—and the key lessons every IT pro should know.
Also, Pro Git, 2nd Edition is free today on Kindle! (Amazon affiliate link) — grab your copy before the offer ends!
#CyberSecurity #Infosec #MFA #FreeEbook
This is yet another reminder to utilize a password manager and allow it to generate long, complex passwords. Also, always enable MFA!
Passwords in the age of AI: We need to find alternatives https://www.malwarebytes.com/blog/news/2025/05/passwords-in-the-age-of-ai-we-need-to-find-alternatives #passwords #passkeys #Privacy #News #mfa #AI
Quite a cool little song about MFA (2FA)
Handle MFA like a pro so you don’t get locked out or let the bad guys in
Why you should use MFA, what about passkeys, what kind of MFA to use, how to make it easier to use, and how to protect yourself against being locked out of an account because of MFA.
#infosec #MFA #passwordManager #passkeys
https://blog.kamens.us/2025/05/06/handle-mfa-like-a-pro-so-you-dont-get-locked-out-or-let-the-bad-guys-in/
Handle MFA like a pro so you don’t get locked out or let the bad guys in
Quite a while ago I wrote about how I back up my multi-factor authentication (MFA) seeds so that it’s easy for me to restore them onto a new phone if my old phone breaks or is lost. A lot has changed in the MFA landscape since then, and my current practice and recommendations have changed along with it, so I think it’s time to refresh my advice. This time around I’m going to expand the scope of the article so it’s about a bit more than just how to do backups.
What is MFA and why is it important?
Feel free to skip this section if you already know the answers to those questions.
Some definitions:
For many more reasons than we can get into here, single-factor authentication isn’t secure enough for most websites. Any networked computer application which has even the slightest value to the people who use it should require multi-factor authentication.
A lot of web app providers split the difference: they support multi-factor authentication, but they don’t require it. You should be enabling multi-factor authentication on every web app you use that supports it, even if it is optional. Look for it in your site account settings or preferences; it’s often listed in a separate “security” section.
The first factor in most multi-factor authentication workflows is a password. You should be using a password manager to generate and store long, random, unique passwords for different web apps. The only password(s) you should be typing from memory are the one to log into your computer and the password for your password manager itself. And your password manager should be secured with multi-factor authentication!
Read on to find out more about the second factors you can use in addition to your password. But first…
What are passkeys, and should you use them?
A passkey is a blob of cryptographic data that allows you to prove your identity to a website. When you log into a site that supports passkeys without using one, something like this happens (speaking very broadly):
If you’re paying attention, then at this point you should be thinking to yourself, “Now hold on, bucko, I thought we were supposed to be using multi-factor authentication! If I can log into a site with a passkey without my password, isn’t that just a single factor and therefore not secure enough?”
There are two reasons why the answer to that question is no:
So, should you use passkeys? That comes down to whether you find them convenient, as long as you follow the cardinal rule. I personally do not use them, because I find a combination of my hardware security key (YubiKey) and the 2FAS app more convenient than passkeys, and because I don’t entirely trust passkeys because they have a vendor lock-in problem.
Passkeys are considered phishing-resistant, meaning that because of the way they work, it is extraordinarily difficult for an attacker to execute a successful man-in-the-middle (MITM) or phishing attack against a website account protected with a passkey.
What should you use for MFA if not passkeys?
Here are your other choices for MFA, in decreasing order of preference based on a combination of security and convenience.
Hardware security keys
If you can handle having a security key such as a YubiKey with you all the time and not leaving it plugged into your work computer when you go home or vice versa, then a WebAuthn security key is the most secure mass-market choice for MFA, for websites which support them.
When your security key is plugged in, logging into a site where you’ve configured it is as simple as using your password manager to auto-fill your username and password, then tapping your security key briefly when you’re prompted to do so.
Some people solve the don’t-forget-it problem by putting the key on their key-chain (it’s hard to drive away when your keys are dangling from your computer!) or wearing it on a chain around their neck. I personally do the latter, and I also use my “remember-the-yubikey” daemon to alert me if I walk away from my computer when my key is plugged in.
Hardware security keys are also phishing-resistant.
Push-based authenticator apps
When you log into a site you’ve configured to use push-based MFA, a notification from the app on your phone pops up and asks you to review and approve the login. In the more secure version of this, the site you’re trying to log into also displays a code which you are required to enter into the app to confirm the login (this is meant to combat “MFA fatigue” attacks).
Push-based authenticator apps include Duo Mobile, Okta Verify, Authy, and Microsoft Authenticator. Just to make things confusing, these apps usually also support the older, time-based authenticators, so if you use the same app for both you end up with a mixture of push-based and time-based authenticators in the same app. I don’t recommend this both because it is confusing and because 2FAS is more convenient.
Because different sites support different types of push-based authenticator apps, if you use a lot of sites you will probably end up with multiple apps of this type on your phone. For example, because of the various sites I use, I have Duo Mobile, Microsoft Authenticator, and Okta Verify.
Push-based authenticators are vulnerable to MITM attacks: if an attacker can trick you into entering your credentials into a site impersonating a real site while they are connected to the real site, they can trick the site into sending you the push-based authentication prompt, log in as you, and gain your access to the site. Push-based authenticators are partially protective against phishing attacks that aren’t MITMs. MFA fatigue attacks are still an issue, but much less so when you are required to enter a code from the site into the app as described above.
Time-based authenticator apps
With time-based MFA, the site you are configuring MFA for displays a secret “seed” as a QR code for you to scan with an app such as Google Authenticator, or a string of characters encoding the seed for you to type by hand if you can’t scan the QR code or you want to copy and paste it into your password manager. The most common time-based MFA algorithm, which is pretty much universal nowadays, is called Time-based One-Time Password, a.k.a. TOTP.
TOTP is vulnerable to MITM and MFA fatigue phishing attacks.
Bespoke authenticator apps
Some sites embed MFA functionality into their functional apps. For example:
The security of bespoke MFA mechanisms maps to the mechanisms described above in an obvious way. For example, LinkedIn’s is push-based without a code entry requirement, and USAA’s is time-based.
Recovery keys
Many sites allow you to download a set of “recovery keys,” each of which is a string of characters which can be entered upon login as your second authentication factor (after your password). Each of these keys can only be used once, so you have to keep the list somewhere and delete or cross off each one as you use it, and then generate more of them immediately after logging in with the last one.
Generally speaking, recovery keys are meant as a backup for when your primary MFA mechanism is inaccessible.
Some sites require you to generate and save recovery keys after setting up some other MFA mechanism.
Recovery keys are vulnerable to both MITM and phishing attacks. They should only be used as a last resort, and you should make sure to store recovery keys securely.
SMS and email only if you have absolutely no other choice
You absolutely should not use text or email messages for MFA unless the site offers no other options. They are better than no MFA at all.
Texts are insecure as MFA because it is easy for an attacker to reroute your text messages to them.
Email is insecure as MFA because it puts all your eggs in one basket: generally speaking the way you reset a lost password is through a link sent to your email, so if an attacker breaks into your email they can gain access to all the sites where you’ve used email as your MFA.
Your account security is only as strong as your weakest MFA link
If you have two different types of MFA configured for one of your accounts, then you should assume that an attacker will figure that out and go after the less secure one. This means it’s incredibly asinine when, for example, a website requires you to set up SMS MFA as a backup immediately after you’ve created a passkey or set up security key MFA. Alas, this is absolutely not theoretical.
If you want to set up backup MFA on a site and you are required to choose, e.g., SMS, email, or recovery keys, you’re better off choosing recovery keys and storing them securely rather than using SMS or email MFA.
Protect yourself from MITM and phishing attacks
The best way to protect yourself against man-in-the-middle and phishing attacks is to only use phishing-resistant MFA. However, many sites don’t support passkeys or hardware security keys, so this isn’t always an option.
Absent phishing-resistant MFA, the other way you protect yourself is a rule you should be following anyway: never click on a link you are not 100% certain came from a legitimate source. Instead, either use the link that you saved in your password manager when you saved the site’s password there; or type the URL of the site into your search bar by hand (“amazon.com”, “usaa.com”, etc.); or save a bookmark the first time you use the site so you can reuse that bookmark later; or go back to an old email from the site which you know is legitimate (e.g., your registration confirmation email, a confirmation email for an order you know you placed, etc.) and click the link there.
If you can’t do any of the above, then you may find yourself resorting to doing a web search for the name of the company to try to find a link to the site. There be dragons here! Attackers use various techniques to trick search engines into putting malicious links at the top of the search results when you search for sites they want to break into, so you have to be extremely careful about what you click on in search results. Avoid links that are marked as ads or “sponsored”; it’s actually easier for hackers to game the ads than the non-sponsored search results.
When should you configure a secondary MFA mechanism for a site?
Many sites that support MFA allow you to configure multiple MFA mechanisms. The easiest way to explain when you should do that is with a flowchart:
The cardinal rule: always have a backup
Your ability to log into any particular site should never be linked exclusively to a single vendor or device. For example:
What strategies and tools should you use for MFA backups?
You should be regularly backing up:
Backing up your password manager data
Consult the documentation for your password manager to find out how to export a backup. Most password managers allow you to export your data.
Once you’ve exported the data, how can you keep it safe? You have two options: you can store it on an non-networked external storage device (e.g., a thumb drive) that you keep at home in a drawer when you’re not saving something onto it or restoring something from it; or you can store it on your network-connected computer or in a protected cloud storage drive as long as it is protected with strong encryption. Personally, I use GnuPG to encrypt my password manager backups before storing them on the family file-server in my basement.
Backing up your passkeys
If you’re saving your passkeys on your smartphone, it’s almost certainly backing them up into the cloud for you automatically. If it’s not, there’s probably no way for you to back them up, which is why, as I mention above, you should always have another way to log into any site where you’ve configured a passkey.
If you’re saving your passkeys in your password manager, then your password manager export may include passkeys (e.g. Bitwarden’s JSON backup format does), or it may not (e.g., LastPass). If your password manager falls into the latter category, then again, this is why you should always have another way to log into etc.
Backing up your TOTP seeds
If you decide to store your TOTP seeds in your password manager then make sure that they are included in its backup export. If they’re not, maybe reconsider that decision (or your choice of password managers)?
Another option is to use a TOTP app that backs up your seeds into the cloud so that you can restore them from there if you switch to a new phone. Many of the apps, including Duo Mobile, Google Authenticator, and 2FAS, support this now; none of them did back in 2017 when I wrote my first version of this article. Information security purists will cry foul and tell you that this isn’t secure and you shouldn’t do it. They’re mostly wrong, but this article is already long enough so I am relegating my explanation of why to a footnote.1
And then there’s the solution that I use: every time I add a new TOTP seed to my app, rather than scanning the QR code displayed by the website directly, I take a screenshot of the QR code, open the image file and scan the image into the app to confirm that it works, give the screenshot file an informative name (e.g., “google-2fa.png”), and then store it as described above for password manager backups. Then, if I ever need to restore all of my TOTP seeds to a new devices, I can bulk decrypt all of the screenshots, open them all in an image viewer, and rapidly scan them all back into the app. (Note that I back up TOTP seeds this way in addition to also configuring 2FAS to back up my seeds into the cloud; the 2FAS cloud backup is for convenience, while the screenshot backups are to protect against vendor lock-in.)
Backing up your recovery keys
When you generate recovery keys for a site, save them as a text file with an informative name (e.g., “google-recovery-keys.txt”) and then store the file as described above for password manager backups.
Backing up push-based authenticator configurations
You usually need to rely on the app to do this for you. Look in your settings within the app or consult its documentation.
Should you store TOTP seeds in your password manager?
Many password managers nowadays essentially have a TOTP authenticator app built into the password manager. You can store the TOTP seed for a site in the password manager alongside your username and password for the site. Then when you are logging into the site, you can easily generate the current TOTP code directly in your password manager and paste it in when prompted for it. Some password managers are even so smart about this that they generate the current TOTP code and copy it into your clipboard immediately after auto-filling the username and password, so you can paste it from there directly into the text field without having to take any further action.
This is Really! Convenient! It is also a security problem, which is why I don’t recommend you do it.2 The problem is that, just as for email MFA, you’re putting all your eggs in one basket: if someone manages to compromise your password manager, then they have access to not only your usernames and passwords, but also all of the TOTP seeds stored alongside them, so they have everything they need to break into all of those sites as you.
Granted, someone breaking into your password manager vault is not actually the threat model we are most concerned about when it comes to web application security, so the risk here isn’t that high. And if there were no other ways to reduce the inconvenience of using TOTP, then I might say sure, go ahead, this is an acceptable trade-off of much increased convenience with only a minor in risk. But there is another way to reduce the inconvenience of TOTP—using 2FAS—so that is what I recommend people do instead.
Using 2FAS to make TOTP easier
2FAS is a TOTP authenticator app for your phone which comes with a huge convenience feature which as far as I know none of the other apps support: it automatically transmits TOTP codes directly from your phone into your browser on demand. Here’s how this works:
Since the communication described above is end-to-end encrypted, which means that the folks who run the 2FAS servers can’t read any of the communications going back and forth between the browser and the app.
The 2FAS app supports backing up TOTP seeds into the cloud with encryption.
This is a great app about which I have only one, cosmetic complaint.
1Here’s Why you shouldn’t worry about backing up your TOTP seeds into the cloud. If your cloud account is secured properly, with a strong, random password and MFA, the odds of a hacker breaking into your account and stealing your MFA seeds are extremely low. On top of that for the MFA codes to do them any good they would also need to break into your password manager or guess your passwords (which of course they can’t do because you’re using long, unique, random passwords for all your sites, right?). Furthermore, many of the apps which support cloud backup (including 2FAS) require you to enter a backup password (which you should generate and store in your password manager!) and use it to encrypt the data. Backing up your seeds into the cloud isn’t zero-risk, but if you’re doing the other stuff right, the risk is extremely small and is certainly outweighed by the benefit.
2There is one circumstance in which you should store a TOTP seed in your password manager, and that is when the password manager entry is being shared among multiple people who all need to be able to log into a shared account. In this case it’s hard to set up secure MFA available to all the people who need access to the account, so setting up TOTP MFA and storing the seed in the password manager is a good trade-off of convenience vs. risk.
In questa #newsletter parliamo di: #Virale vuol dire ancora qualcosa?
Buon World #Password Day! Tra #MIT, #Hacker, #Infostealer e #MFA. Perchè sono così vulnerabili
Perché #Tiktok ha preso una multa da mezzo miliardo in #Europa
#Meta lancia la sua app #IA personale: un assistente vocale che può fare anche da #social
#AI, come le #BigTech indeboliscono il codice di buone pratiche europeo