How hackers are breaking into MFA enabled Microsoft 365 accounts

แชร์
ฝัง
  • เผยแพร่เมื่อ 25 ส.ค. 2024
  • Visit our website for more information: gcit.com.au/ho...
    This video delves into the alarming rise of attacks on Microsoft 365 accounts equipped with Multi-Factor Authentication (MFA). We explore how sophisticated tools like Evilginx exploit vulnerabilities to steal session cookies and bypass MFA, potentially compromising sensitive company data.
    Learn about the evolution of phishing techniques and the steps organizations can take to defend against these threats. These prevention tools include Clarion, an open-source tool designed to detect and thwart phishing attempts. We also discuss proactive measures like enhanced phishing protection, country-based restrictions, stricter VPN authentication, and ongoing security awareness training and phishing simulations to fortify your organization's defenses against cyber threats.
    Need help with your IT security?
    www.gcit.com.au
    info@gcit.com.au

ความคิดเห็น • 275

  • @TreeLuvBurdpu
    @TreeLuvBurdpu 5 หลายเดือนก่อน +336

    Password Managers have been thwarting this attack for THREE DECADES, because they don't confuse similar URLs.

    • @ElliotMunro
      @ElliotMunro  5 หลายเดือนก่อน +50

      Good point, a password manager and the user not knowing their password would be a good defence also.

    • @TreeLuvBurdpu
      @TreeLuvBurdpu 5 หลายเดือนก่อน +34

      @@ElliotMunro yes, or even if they know the password, let the password manager fill it in and do what it's made for. I do that all the time and it's saved me more than once because it actually reads the ASCII URL and isn't fooled by similar Unicode characters.

    • @pinkcommando1445
      @pinkcommando1445 5 หลายเดือนก่อน +28

      Paradoxically if a user needs to login on a different URL the password may not be auto filled. (I.e logging in with a Google account to Google play vs Gmail) In this case a user may search their password manager for their login and copy it into a potentially malicious page.

    • @kbhasi
      @kbhasi 5 หลายเดือนก่อน +8

      Yep! Based on my experience, I've seen some older people in my family use text files instead of password managers, so I imagine such people would still fall for phishing attacks.

    • @AArch64_Gamer
      @AArch64_Gamer 5 หลายเดือนก่อน +14

      @@kbhasi My dad uses sticky notes that he carries around. I keep telling him to use a password manager, but he either pretends he doesn't hear anything, or starts talking about how Face ID sends your face to the government, and how he wants to wear a face mask to stop it. At this point I gave up on him, and I don't care if he loses a password or gets something stolen because I warned him, and he didn't listen.

  • @philp7844
    @philp7844 5 หลายเดือนก่อน +38

    Unfortunately, you can implement all the security in the world but if a user is duped into giving away access, there's not much you can do about it. Every organisation is different but securing systems is best achieved in layers. For M365, Conditional Access Policies is the way to go (ie: MFA, device filtering, named locations, restrict access to only the users who require it, etc). Hackers look for the low hanging fruit and will move on to the next unsuspecting victim .

    • @virgilclejeneanu8964
      @virgilclejeneanu8964 4 หลายเดือนก่อน

      You can use intune and conditional access, a policy that let you to connect only if your device is a corporate one.

  • @EZLogikal
    @EZLogikal 4 หลายเดือนก่อน +8

    Conditional Access policies that check client posture are huge in preventing this kind of attack, and are totally transparent, so no additional burden on the user.

  • @ragtop63
    @ragtop63 5 หลายเดือนก่อน +146

    So people are still clicking on links in unsolicited emails? You’d think by now that everyone would know not to do that.

    • @satunnainenkatselija4478
      @satunnainenkatselija4478 5 หลายเดือนก่อน +31

      Yes because companies send their employees unsolicited emails which contain links that the employee needs to click to access online training, for instance. Thus making the employees diligence a single point of failure and the only safeguard against attackers. I've been warning about this for years but to no avail.

    • @crangos
      @crangos 5 หลายเดือนก่อน +22

      That's a fair bit simplistic. Phishing has gotten very sophisticated. We regularly get hyper-specific phishing mails, like mentioning collegues and topics tailored to the individual. Incorporating information from LinkedIn, publications, public repos etc. On first and second glance super real looking! Scary stuff. 99% is identified, but it takes one well crafted mail...

    • @babybirdhome
      @babybirdhome 5 หลายเดือนก่อน +10

      @@crangosNot just this, but if they ever manage to phish someone that you’ve emailed in the past, then they’ll phish you from someone you actually communicate or work with regularly. And they’ll even hijack existing legitimate email threads to get you to click on the link. Couple that with things like punycode domain names, zero-width fonts, and other techniques, and they can easily bypass most email security tools, the most diligent and security-educated users, and the whole nine yards.

    • @J_Daddy72
      @J_Daddy72 5 หลายเดือนก่อน +2

      Ummmm? You know people still smoke too, right?

    • @Graeme_Lastname
      @Graeme_Lastname 5 หลายเดือนก่อน

      It'll be right m8. It's never caused any problems before cobber. 🤣👍🇦🇺

  • @huskyhacks
    @huskyhacks 5 หลายเดือนก่อน +25

    was wondering momentarily why the Clarion repo stars surged yesterday 🤣
    Thanks for the shoutout Elliot. One point of clarification: Clarion, by itself, doesn't render that cool warning CSS that you see in the demo video. That's an additional feature specific to CIPP which was developed by CIPP's maintainer.

    • @ElliotMunro
      @ElliotMunro  5 หลายเดือนก่อน +10

      Ah yes that explains it then. We deploy clarion via CIPP :) Thanks for the great tool!

    • @mark33545
      @mark33545 5 หลายเดือนก่อน +1

      CIPP is open source right? Is it possible for us to add that functionality to Clarion ourselves? I don't need CIPP because I am just a sysadmin, not an MSP but I want this feature.

  • @user-kk3jr8gi2x
    @user-kk3jr8gi2x 5 หลายเดือนก่อน +6

    All this cookie talk is making me hungry.

  • @johndenver8907
    @johndenver8907 5 หลายเดือนก่อน +60

    This is why I don't even know the passwords I use. I store them in the browser and if the link doesn't match then I can't even enter the password if it's not saved.

    • @AceOfRock
      @AceOfRock 5 หลายเดือนก่อน +8

      And you store them in your browser? 🤔

    • @jh-devv
      @jh-devv 5 หลายเดือนก่อน +7

      ​@@AceOfRockShould be ok if encrypted with a primary password like Firefox does.

    • @emurphy42
      @emurphy42 5 หลายเดือนก่อน +4

      ​@@jh-devv Hope your browser never ever loses track of its data like Firefox occasionally does after an auto update. I recommend backing up your profile from time to time, or using an add-on that syncs the data somewhere.

    • @jh-devv
      @jh-devv 5 หลายเดือนก่อน +2

      @@emurphy42 Yea, I mean, I use Firefox Sync but yeah.
      Though, this does seem to happen on Linux?

    • @K9Megahertz
      @K9Megahertz 5 หลายเดือนก่อน +1

      @@jh-devvAt some point the password needs to be decrypted no? Or is it sent to the remote side encrypted? I don't think that it is. Would not be hard to pull that out of memory from a compromised system.

  • @2glory
    @2glory 5 หลายเดือนก่อน +4

    🎉 great video. What about the Azure to Azure emailing using Powershell and Microsoft direct send. Most environments aren’t preventing these. You could block hard fails for SPF. Reject messages that aren’t encrypted using TLS and some others.

  • @trewjohn2001
    @trewjohn2001 4 หลายเดือนก่อน +1

    You would think that the two factor cookie would only be valid for one login attempt for that device, with that browser with that ip address. If two factor authentication is being used it already means something is unusual about the login.

  • @DerekWelton
    @DerekWelton 5 หลายเดือนก่อน +12

    It would require additional backend work for Microsoft, but the cookie or token that they issue out could contain the IP address that requested the token/cookie and they would have to validate that part during the Auth process that every request made matches the IP address from within the cookie or token.

    • @rezwhap
      @rezwhap 5 หลายเดือนก่อน +9

      It doesn’t work since IP addresses can change on mobile networks, for one example. IP geolocation can be effective though.

    • @DerekWelton
      @DerekWelton 5 หลายเดือนก่อน +2

      @@rezwhap that's true, I didn't think about phones. Maybe you can bypass it if you have the app, but still.

    • @babybirdhome
      @babybirdhome 5 หลายเดือนก่อน +5

      There are still bypasses to this even if you did it. The attacker would only need to proxy your login from their own IP and then they own the session, not you. MFA is good, but it isn’t foolproof. Passwordless (e.g., FIDO2) is the future.

    • @totaltronix
      @totaltronix 5 หลายเดือนก่อน

      Perhaps a country match check?

    • @cad4246
      @cad4246 5 หลายเดือนก่อน +4

      In this example the attacker is using their own IP to connect. The victim never connected to m365. They gave both authentication tokens to the attacker and the attacker passed them onto m365 to get the auth cookie.

  • @GothAlice
    @GothAlice 5 หลายเดือนก่อน +2

    10-15 years ago or so I gave a presentation at a university lecture hall “On The Security of Systems and Applications”. One of the audience nearly sued me. Of course I ran a NAT hijack of that segment of the campus network. Of course I ran automatic MITM session hijack over that stream of data. Of course I had software automatically posting as captured users, on their own accounts, that “I should probably pay more attention during a security talk.”
    Opening the presentation by sending an e-mail to everyone present, from Bill Gates, containing a one trillion dollar signed PDF refund notice from Amazon. That… left a few jaws on the floor. But there were still people who couldn’t resist Facebook or Twitter while I presented. Come on, children. Be smarter. (These were not actually children.)

  • @raddastronaut
    @raddastronaut 5 หลายเดือนก่อน +1

    Always type the URL yourself.

  • @Venessens
    @Venessens 5 หลายเดือนก่อน +1

    Why not encrypt the IP address or location info in the cookie and check if it matches the users information

  • @kefpull6676
    @kefpull6676 4 หลายเดือนก่อน

    I've bought many cookies, but I didn't know how the 2fa would get bypassed. Good video 👍

  • @NAY2GAS
    @NAY2GAS 12 วันที่ผ่านมา

    What if the user never recieved a prompt to setup MFA, Can the hacker setup MFA for that user?

  • @timeimp
    @timeimp 5 หลายเดือนก่อน +6

    Thank you algorithm for this video. Liked and subbbed!
    Wonder how long until passkeys save us from this nightmare?

  • @GeneralKenobi69420
    @GeneralKenobi69420 3 หลายเดือนก่อน

    Literally the only times I click links in my email is after making a new account somewhere and after ordering something (when I'm not using Amazon). I ignore everything else

  • @ayushbhansali8599
    @ayushbhansali8599 2 หลายเดือนก่อน

    Does this vulnerability still exist with on-premise 2fa deployment?

  • @thomaswood7495
    @thomaswood7495 5 หลายเดือนก่อน

    It comes down to URL obfuscation. Comes down to people not reading again, which has been a problem since the dawn of the computer age.

  • @saxtant
    @saxtant 5 หลายเดือนก่อน +6

    Just to be clear, this is a standard false url attack, the mfa part is moot.

    • @weirdfo
      @weirdfo 5 หลายเดือนก่อน +5

      The point of it is to demonstrate that a false URL attack would have been useless with MFA before, but now the false URL attack is a middle-man for getting a legitimate MFA token

    • @ElliotMunro
      @ElliotMunro  5 หลายเดือนก่อน +10

      The standard phishing attacks would just take your username and password, but if you had MFA, they wouldn’t be able to get in. These attacks are much more dangerous because they take the authenticated cookie and still work if the user has most forms of MFA enabled

  • @Microtonal_Cats
    @Microtonal_Cats 5 หลายเดือนก่อน +9

    Thank you for your service!

  • @timothyjohns3561
    @timothyjohns3561 5 หลายเดือนก่อน +6

    Does this attack work if the User is using their registered Microsoft Authenticator app as 2FA? When my MSA wants to check my identity they display a number on the screen and ask me to open my MS Authenticator app and click the corresponding number from the list on the screen in the Authenticator app. Seems to me this approach would foil this MITM attack?

    • @cad4246
      @cad4246 5 หลายเดือนก่อน +3

      It still works. The hacking tool is logging into the real m365 site in the background and grabs the session cookie when it's done. The user will see the Auth pop up on the app as usual, and click ok. So it doesn't matter which second factor is used, if the user is tricked, the exploit works.

    • @mark33545
      @mark33545 5 หลายเดือนก่อน

      @@cad4246there is a new feature you can turn on which shows the location of the request, it wont match the user and a savvy user would realize that. Problem is, a savvy user wont be logging in a fake site to begin with!

    • @bountygiver2
      @bountygiver2 4 หลายเดือนก่อน

      Only if you don't pay attention. The app will tell you the browser and location of the login request. This attack will make the request from the attacker's computer and you will find the mismatched information. However the attacker also do know which city and browser you are using and is possible to proxy the request to try to keep it the same, so the only indication they cannot spoof is the IP address so you will have to pay attention to that.

    • @ytdlgandalf
      @ytdlgandalf 3 หลายเดือนก่อน

      Fido/security keys/passkeys do provide safety in these circumstances

  • @2kings3queens
    @2kings3queens 5 หลายเดือนก่อน +1

    At least you ended with what you should be recommending in todays day and age, FIDO credentials, hardware bound passkeys(security keys like yubikey) and zero trust. I think going password less should be a focus with phishing resistant MFA by using both syncable & hardware bound passkeys is the future

  • @ibgib
    @ibgib 5 หลายเดือนก่อน +1

    This was an obvious attack from the inception of how MFA is implemented and our current PKI-centric authentication models. I created a new protocol that came naturally from my semantic version control approach that utilizes Merkle DAGs/hypergraphs. My driving use case wasn't security, but the transactional nature of exchanging graphs was needed and the authn side of it is a natural layer on top of this transactionality. The mechanism works similarly to how today's sphincs algorithm works, and it has qualities of the double-ratchet mechanism used in signal's encryption protocol. Unfortunately, security people are pretty hoity toity and don't want to stick their head out of the box to make a lot of money. Let somebody else make all that money, right?!

  • @Elwon20
    @Elwon20 5 หลายเดือนก่อน +1

    Why are the cookies not bound to the client ip address?!

  • @Cloudxxx23
    @Cloudxxx23 5 หลายเดือนก่อน

    So it starts when you click a fake log in link disguised as a genuine email sender(microsoft, google, etc.)?

  • @Tenefel
    @Tenefel 5 หลายเดือนก่อน +2

    Great information and easily digestible. Wouldn't a possible answer make six digit 2FA codes single use? It's my understanding that 2FA codes (currently) rotate through an authentication algorithm on a 60s timeframe, but that's for a single-dimensional model. If each 60s timeslot was then vectored so the first request generated the "standard" 2fa, but immediately expired that token and algorithmically generated a new token - the attacker would not have the public/private key combo necessary to follow that sequence, so the stolen 2FA key would be denied as "already used". Only the owner of the Public/Private pair would know the next key in the sequence. Now granted, it would be a race condition between the attacker and authorized user at that point. To my thinking, that should plug all the holes? And yes, using a password manager for all of this would solve everything, but good luck getting Granny to sign on to that model...

    • @burdenstephen
      @burdenstephen 4 หลายเดือนก่อน

      The token is single use, but the tool is presenting the login information to Microsoft as the user logs in (thats how it knows the user mobile number). Once the token is presented they get the cookie

  • @terpsiterpsi
    @terpsiterpsi 5 หลายเดือนก่อน +5

    Surely Microsoft are issuing takedowns on the malicious domains? If so how quickly are they able to react and create new ones? Would seem to me the effectiveness of this technique would reduce the more unlike the original domain it becomes

    • @DailenGunter
      @DailenGunter 5 หลายเดือนก่อน +1

      One threat I encountered was being protected by Cloudflare captcha and proxy. Email scanner couldn't even scan the link to the bogus login domain.

    • @ElliotMunro
      @ElliotMunro  5 หลายเดือนก่อน +2

      The evilginx tool can be hosted on a private server by anyone, and they can register any domain they like for their phishing URLs. Microsoft’s defender for endpoint does generate alerts when a device connects to a site recognised as an ‘adversary in the middle’ but it’s a whack a mole approach where new domains aren’t identified and blocked right away.

    • @TheCatherineCC
      @TheCatherineCC 5 หลายเดือนก่อน

      Couldflare doesn't take down malicious domains or malicious content in a timely manner. It's effectively up for a month even if it's reported.

    • @cad4246
      @cad4246 5 หลายเดือนก่อน +1

      I was surprised you didn't mention this is an "adversary in the middle" attack in the video. Takes me back to my CS days 25 years ago!

  • @dauchande
    @dauchande 4 หลายเดือนก่อน

    Doesn't something like Microsoft Sentinel have the capability to force a reset of your password if it detects abnormal access to company resources (at least in Azure)?

  • @GreenDriveIndia
    @GreenDriveIndia 5 หลายเดือนก่อน

    Why can’t they session to a geo Location ip, if ip is completely different then invalidate the session,

  • @kylewatson5133
    @kylewatson5133 5 หลายเดือนก่อน

    I just never click on login type websites from an email - even if I'm expecting it from the sender.

  • @robertleist771
    @robertleist771 5 หลายเดือนก่อน +6

    Does using the Authenticator app with number match help thwart this? Or can the attack engine also screen scrape the number and present it to the victim?

    • @mattmichaels3175
      @mattmichaels3175 5 หลายเดือนก่อน +2

      Would also like to know the answer to this

    • @ElliotMunro
      @ElliotMunro  5 หลายเดือนก่อน +9

      Unfortunately not, EvilGinx will still display the number to the victim and steal the credentials and cookie

    • @babybirdhome
      @babybirdhome 5 หลายเดือนก่อน +1

      Not even tying the login session to a specific IP or IP range can effectively prevent MFA attacks. MFA is good, but in the long term, it isn’t the answer. Passwordless with something like FIDO2 or Passkeys is the best bet, but even those won’t 100% prevent having a dedicated cybercriminal get into your stuff or make a mess of your life. They’ll just have to pivot to other attack vectors.

    • @georgewashington3012
      @georgewashington3012 5 หลายเดือนก่อน +1

      @@ElliotMunroSo the hacker attempts to log in seconds before the employee, so they know which number to present to the victim as the number to enter into their authenticator app? Is that how circumvention of number matching works?

    • @ElliotMunro
      @ElliotMunro  5 หลายเดือนก่อน +1

      @@georgewashington3012 the evilginx tool presents the actual Microsoft 365 login screen to the victim, including whatever mfa method the user has set up, when the user completes the login process, evilginx captures the username and pasword from the user and the authentication cookie returned from Microsoft 365.
      It’s called an adversary in the middle or man in the middle attack - it proxies the login page via a fake URL and sits in the middle of the login process and intercepts everything exchanged between the victim and Microsoft.

  • @geniferteal4178
    @geniferteal4178 5 หลายเดือนก่อน

    Where do i click on a false u r l? In all instances i use a company installed icon. (Phone&computer)

  • @tonwu9262
    @tonwu9262 5 หลายเดือนก่อน +5

    Great video Elliot!
    I've set up Clarion and an instance of Evilginx to test this out. Clarion detects the malicious URL but I don't know how to change the CSS of the login page to display the warning, how did you manage to do that? Could you point me in the right direction? Also, can Clarion be used for production, I would like to set this up so users get warned when accessing a proxy page of the microsoft login.

    • @ElliotMunro
      @ElliotMunro  5 หลายเดือนก่อน +6

      We used a tool called CIPP to deploy it as an MSP, but from what I can see on clarion’s GitHub guide, you go to the company branding setting in Entra ID and update the CSS there.

    • @BERBERAttire
      @BERBERAttire 2 หลายเดือนก่อน

      Does ms defender and safe Url feature detect dodgy link? ​@@ElliotMunro

  • @DamagedDingo
    @DamagedDingo 5 หลายเดือนก่อน +4

    Why does a cookie work on another device? Seems it should be tied to the hardware

    • @TheCatherineCC
      @TheCatherineCC 5 หลายเดือนก่อน +1

      Or at least the IP address.

    • @hirushanthilanka5283
      @hirushanthilanka5283 5 หลายเดือนก่อน

      Its not easy to bind cookie to hardware addresses. That not only difficult but could cause lot more sophisticated attacks

    • @cad4246
      @cad4246 5 หลายเดือนก่อน +5

      The cookie was generated on the attacker's device not the victim's.
      The victim is tricked into providing password and then completing mfa. Attacker is connecting to the real m365 themselves, pass through the password, and then just waits a moment for the user to do the MFA.
      The tool then outputs the cookie at the end for the attacker to use on the same device.

  • @JamesGarrity
    @JamesGarrity 5 หลายเดือนก่อน

    I’ve been receiving at least three times a week request for change the password for my Microsoft

  • @filip_opalka
    @filip_opalka 4 หลายเดือนก่อน

    Would using a hardware token not help here?

  • @raufsat8261
    @raufsat8261 5 หลายเดือนก่อน

    Allow list: if issue identified: block general region (for a while) & inform relevant region authority as to why.
    ?

  • @louiemalim3394
    @louiemalim3394 5 หลายเดือนก่อน +3

    Can setting policies like Impossible travel detect and block sign-in attempts that occur from geographically distant locations within a timeframe that's impossible for normal travel ?

    • @artstar111
      @artstar111 5 หลายเดือนก่อน +2

      Don’t forget thought that a user may sign in from their home, then vpn and or Remote Desktop into another computer on a network in a different distant location which could seem like impossible travel for a human but normal for internet traffic.

    • @artstar111
      @artstar111 5 หลายเดือนก่อน

      It might be worth considering having the Mfa device location be tracked but then there are other possible issues like privacy, and false positives locking you out too.

    • @ElliotMunro
      @ElliotMunro  5 หลายเดือนก่อน +1

      Yep, impossible travel alerts will be generated by these attacks if the user's company has Defender for Cloud Apps, and conditional access policies that block the attackers countries will stop it as well. Attackers can impersonate a victims' country with VPNs, so other methods need to be used to stop this. Eg stricter conditional access policies with continuous access evaluation based on device compliance/allowed countries, phishing resistant MFA, identity risk policies etc

  • @AshleyM120
    @AshleyM120 5 หลายเดือนก่อน +1

    How about doing the only thing that seems to work for companies like Microsoft/Google whitepapers ? Don't rely on user URL recognition and mendate U2F with FIDO2 keys which enforces URL signature by design ? (For Microsoft EntraID required advanced authentication package a few years ago). Security awareness is cute for feel good compliance but i have never seen actually work in red teaming. It doesn't work at scale as 1 employee in 10 000 spam is enough to get a beachhead in a company (salary/dresscode or more salacious company product info leak and you always get a few hundred people who will click no matter the training).

    • @ElliotMunro
      @ElliotMunro  5 หลายเดือนก่อน

      As an MSP we’ve got to work with our customers to roll out appropriate security measures. FIDO2 keys are an ideal solution and we use them internally, however the price, change of process, and trust in other MFA methods has been a barrier for some small businesses. Our approach to address attacks like these is to first remediate with low user impact changes on the services we manage for customers, and plan the roll out of higher user impact changes during customer meetings. While its effectiveness can be debated, security awareness training has its benefits - it’s requested by insurers here in Australia for Cyber Insurance and is part of the CIS Controls framework that we build our services around.

  • @MichaelHagberg
    @MichaelHagberg 5 หลายเดือนก่อน +2

    Implement Steve Gibson's SQRL

  • @Thomas-uh3dt
    @Thomas-uh3dt 3 หลายเดือนก่อน

    i do wish to ask, for anyone that can help, at times im getting authentication codes in my gmail as if someone has tried to login to my account, does that mean that my password is compromised?

  • @ScottMillar
    @ScottMillar 4 หลายเดือนก่อน

    In regards to AI tooling for phising what are you using?

  • @SergioDeFalco
    @SergioDeFalco 5 หลายเดือนก่อน +1

    And so Microsoft doesn't have an IP geolocalization based protection in order to avoid this? I can remember a few services have it.

    • @jsieb
      @jsieb 5 หลายเดือนก่อน +1

      They do, it's call conditional access, but it doesn't take place until after authentication occures.

  • @Trevorodunne
    @Trevorodunne 5 หลายเดือนก่อน

    Browsers should have some ID in the cookie. If the hackers try it with another browsers it should fail because ID do not match. from the original browser that was used trying to log on with.

  • @monkeysgone2heaven1
    @monkeysgone2heaven1 5 หลายเดือนก่อน +3

    Thanks, interesting. Do passkeys help in this situation?

    • @ElliotMunro
      @ElliotMunro  5 หลายเดือนก่อน +2

      Yep passkeys would help prevent this attack

  • @trebortech
    @trebortech 5 หลายเดือนก่อน +8

    Why not add FIDO authentication to your toolbox?

    • @ElliotMunro
      @ElliotMunro  5 หลายเดือนก่อน +6

      Yep I mention that at the very end. Ideally we’d have them deployed for everyone but the price and having to keep the key on you has been a barrier for many customers.

    • @LimitedWard
      @LimitedWard 5 หลายเดือนก่อน +6

      Passkeys would mitigate this while being free, no? I suppose then it's only as secure as the passkey storage. IIRC MS authenticator was adding support.

    • @ElliotMunro
      @ElliotMunro  5 หลายเดือนก่อน +6

      @@LimitedWard good point, switching to relatively free passkeys is a great solution that I should’ve mentioned

    • @JorgetePanete
      @JorgetePanete 5 หลายเดือนก่อน

      Support for phones as keys is being worked on

  • @lukepeterharriss
    @lukepeterharriss 5 หลายเดือนก่อน +5

    Mr. Beast

  • @demarcorr
    @demarcorr 5 หลายเดือนก่อน +3

    idgi, so basically dont click sketchy links?

    • @RamAnveshReddy
      @RamAnveshReddy 5 หลายเดือนก่อน +2

      The whole point is that ppl don't realise the links are sketchy

    • @bite-sizedshorts9635
      @bite-sizedshorts9635 5 หลายเดือนก่อน

      Don't click on any links in email from anyone. If you don't recognize the link, Google it to see if anyone else has had a problem. If not, type the URL into your browser manually.

  • @2Fast4Mellow
    @2Fast4Mellow 5 หลายเดือนก่อน +1

    That MFA implementation by Microsoft is really not up to par!
    Our system only allows an MFA code to be used once. Similar to how you can associate an IP address with a session, we can also record the 'timecode' (epoch % 30) for each account login.
    When a user successfully authenticates, we not only record their IP address but also the timecode.
    If there's already an authenticated session with that timecode, we reject the second attempt. Additionally, our system essentially creates a 'mutex' based on the email used. This means that if a second session with the same email is initiated, that request is blocked until the first authentication session is completed, ensuring that simultaneous logins are not possible. This provides a straightforward way to prevent a user from being authenticated twice using the same code...

    • @CareyEvans
      @CareyEvans 5 หลายเดือนก่อน +1

      You've missed the evil genius of how this software circumvents the MFA. The MFA code here is only used once, always from the attacker's IP address, and without delay; the user types it into a form that submits it to the attacker's software, and the attacker's software sends it on to Microsoft's login server only once without storing it. The magic happens when Microsoft's login server responds with the cookies that the customer's browser will use in the future, but they never reach the customer's browser (or IP address). They're kept by the attacker, and can be copied straight into the attacker's browser, still only in one place with the right IP address and timing.
      Instead of getting the cookies, the customer gets a redirect to the real Office home page. They were probably already logged in, so they don't notice anything going wrong.

    • @lynskyrd
      @lynskyrd 5 หลายเดือนก่อน

      @@CareyEvans but wouldn't 2 logins from different ips but the same session ID be detected by Microsoft. I mean- 2 identical session IDs should not even be permitted. ??? It doesn't sound like it would be difficult to check for at Microsoft's end.

    • @CareyEvans
      @CareyEvans 5 หลายเดือนก่อน

      @@lynskyrdThe customer's existing session ID cookies are safe and untouched; there's malware that steals them, but that's a completely different problem.
      The new session ID cookies from this attack never leave the attacker's control, so there's nothing Microsoft sees except an old session from the customer and a new session from the attacker.

  • @markedwards4879
    @markedwards4879 4 หลายเดือนก่อน

    Ironically if someone is using a keychain password manager to manage their 365 account it could be more secure as it will see that the url is incorrect and won’t fall for the trick. I’m not recommending that as a foolproof strategy though lol.

  • @DeronSizemore
    @DeronSizemore 5 หลายเดือนก่อน +3

    This may be a dumb question and I'm missing the obvious, but how does this fake form know the user's cell phone number to send them the MFA code? Wouldn't the user's account already need to be compromised in order for the attacker to know the number? Or is it assumed that some other social engineering has taken place to acquire it?

    • @Gebes
      @Gebes 5 หลายเดือนก่อน +4

      When the actual login form gets the number returned then you get it too, when you mimick the flow in the phishing form

    • @soadyp
      @soadyp 5 หลายเดือนก่อน

      The form doesn not know the users details. The tool does the first part of the logon in the background.
      This triggers are real SMS to user.
      The user gets the txt and then they enter the CODE in the fake CODE screen.
      Now the hacker has password and the an actual live code good for 30 secs.
      Too easy.
      The problem remains dickheads clicking on fake links to begin with.
      Hard to protect people from themselves.

    • @mattclarke7
      @mattclarke7 5 หลายเดือนก่อน

      @@Gebesprobably the same way they can copy the branding etc

    • @DeronSizemore
      @DeronSizemore 5 หลายเดือนก่อน

      Thanks. So is this an actual login form from Microsoft just embedded into a fake website which then uses the malicious software to capture the keystrokes? @@Gebes

    • @ElliotMunro
      @ElliotMunro  5 หลายเดือนก่อน +7

      ​@@DeronSizemore that's right, the evilginx tool presents the actual Microsoft login screen to the user, but intercepts all information exchanged to and from Microsoft and the user, including the authentication cookie

  • @alexjones9308
    @alexjones9308 3 หลายเดือนก่อน

    I work in a MSP, I would share this with my team. but the won't listen. The Company has horrible ethics

  • @kevo3111
    @kevo3111 5 หลายเดือนก่อน

    3:51 What is this app/service that detects potential phishing login pages? Where can I get more info on it?

    • @ElliotMunro
      @ElliotMunro  5 หลายเดือนก่อน +2

      The tool is called Clarion by HuskyHacks, I just added a link to the description

  • @agreen182
    @agreen182 3 หลายเดือนก่อน

    Don’t. Click. Links. In. Emails. Ever. Ever. Ever.

  • @alienJIZ1990
    @alienJIZ1990 4 หลายเดือนก่อน

    Cookie session hijacks are mad scary

  • @SimX9000
    @SimX9000 5 หลายเดือนก่อน +3

    Microsoft or anyone else could easily detect an IP change, why not invalidate the session cookie upon an IP change? Yes I get there are legitimate reasons an IP would change but seems like such a simple thing they could do or at least give users the option if there is an IP change require reauthentication? Not to mention the fact the user agent, all of it. Sure the attacker could spoof that but these seem like pretty basic things to me.

    • @smc812
      @smc812 5 หลายเดือนก่อน +3

      They more or less have this with Entra Continuous Access Evaluation, but it needs to be more nuanced as lots of businesses use multiple outbound IPs for NAT or proxy due to port exhaustion including mobile networks, so you have to use something broader like country or login risk.

  • @adamwdotnet
    @adamwdotnet 5 หลายเดือนก่อน

    This requires the attackers OAuth app to be authorised doesnt it?
    If a tenancy only allows particular apps to be authorised then thats also a way of thwarting this attack

    • @mark33545
      @mark33545 5 หลายเดือนก่อน

      Did he say they are using oauth?

  • @aibel99
    @aibel99 5 หลายเดือนก่อน

    Sorry how do they get the code from your phone? I didnt understand that part

    • @kevinkehoe9950
      @kevinkehoe9950 4 หลายเดือนก่อน

      When the user authenticates their MFA, a cookie is created to stored their login session. The script gives us the cookie valid so we can login as them bypassing the MFA

  • @KenTeague72
    @KenTeague72 5 หลายเดือนก่อน

    Microsoft's MFA implementation using their Authenticator app will promp the user to input a two digit number that the website preaents to the user. Compare that to your typical MFA where you have a rotating 6 digit code, or a push notification, if timed correctly, could allow a threat actor to build a fake web site to trick tthe user to input credentials followed by their authentication code that caan be relayed to the actual web page for authentication and grabbing the cookie. However, as noted by others, password managers will not fill in credentials for unknown web sites.
    Now, back to Microsoft's MFA implementation where the web site presents a code, I'm not a big fan of Microsoft or being forced to use their authenticator app, but they did do something better than current implementations of MFA. Sure, a relay method cm still be used if the threat actor could grab the code that the real web site is presenting to the user, then, in turn, present that on the fake web site, but it's more complicated.

  • @senchaholic
    @senchaholic 4 หลายเดือนก่อน

    Logging in with a passkey would've thwarted this attack.

  • @georgewashington3012
    @georgewashington3012 5 หลายเดือนก่อน

    How does a whitelist approach work when employees travel quite a bit for work/vacation? It doesn’t seem feasible for a large company. Placing someone on a different policy when they complain from their vacation destination isn’t practical.

    • @morbau11
      @morbau11 5 หลายเดือนก่อน

      *allowlist

    • @georgewashington3012
      @georgewashington3012 5 หลายเดือนก่อน

      @@morbau11 Whitelist. Don’t be so fragile and assume everything that refers to color is somehow low-key racist. How utterly pathetic.

  • @sonboyjim
    @sonboyjim 5 หลายเดือนก่อน

    Could you let me know what feature you intend on using to require stricter authentication when signing in with a VPN?

    • @ElliotMunro
      @ElliotMunro  5 หลายเดือนก่อน +1

      We're using sign in risk policies with Entra ID P2 - if it detects a sign in from an anonymous IP it will prompt for a phishing resistant form of authentication (eg hardware key) or it will require that the device is intune compliant

    • @mark33545
      @mark33545 5 หลายเดือนก่อน

      @@ElliotMunrothat won’t work, for example, my vpn is a cheap vps i have in another country, the hackers might be as well.

    • @ElliotMunro
      @ElliotMunro  5 หลายเดือนก่อน

      @@mark33545 yep it’s a layered approach. When we’ve seen this attempted or executed successfully, the attackers were using vpns with anonymous IPs. You’re right that this won’t be the case for all however, and there might be very well be successful attacks that went undetected due to non-suspicious sign in properties. We’re constantly monitoring for other activities typical of these attackers, and the hope is we have enough layers to detect and block them early enough while we get phishing resistant MFA methods rolled out across our customers

    • @mark33545
      @mark33545 5 หลายเดือนก่อน

      Would enabling passwordless MFA alone be enough to solve this? Also, what are you seeing as their typical activities once in? I am considering rolling out TAPs so that I can require MFA for changing security info (but how long until their attack also works around that!) Do you think that would help? @@ElliotMunro

  • @serdip
    @serdip 5 หลายเดือนก่อน

    Cookies are inherently unsecure and need to be replaced. What if websites displayed a QR code that has to be scanned by the user's phone, which was previously authenticated? Upon successful scanning of the QR code, the user completes login with biometric data from the phone's fingerprint reader or face scanner.

    • @alb12345672
      @alb12345672 5 หลายเดือนก่อน

      Detect IP addresses. Some banks do it. The session keeps the IP address. Different IP? Cookie is trash.

  • @robdavy4468
    @robdavy4468 5 หลายเดือนก่อน

    Maybe this is a stupid question, but how are the attackers getting the cookie?

    • @ElliotMunro
      @ElliotMunro  5 หลายเดือนก่อน +1

      They proxy the Microsoft login screen, presenting it to the user via a fake url and intercepting the cookie and anything exchanged between the user and Microsoft on that page.

  • @rachelandwayne
    @rachelandwayne 5 หลายเดือนก่อน

    Is this something SafeLinks would catch if it was turned on for the organization?

    • @ElliotMunro
      @ElliotMunro  5 หลายเดือนก่อน +2

      I don’t think it does a consistent job of it. We have safe links rolled out across all customers and are still receiving notifications of connections to these ‘adversary in the middle’ sites

    • @rachelandwayne
      @rachelandwayne 5 หลายเดือนก่อน

      @@ElliotMunro Thank you, thats good to know going forward!

  • @moe47988
    @moe47988 5 หลายเดือนก่อน +3

    MONTHLY security training for the staff? I think every 6 months should be enough.

    • @GregKael
      @GregKael 5 หลายเดือนก่อน +4

      You would think so, but experience tells me otherwise.

    • @rezwhap
      @rezwhap 5 หลายเดือนก่อน +2

      Staff will definitely ignore training given every month! Same way that forcing regular password changes leads to weaker passwords.

    • @ElliotMunro
      @ElliotMunro  5 หลายเดือนก่อน +4

      We’re going with a module a month on a different subject eg spotting phishing, clean-desk policy, don’t insert random usbs. Apparently it helps with retention but we’ll see how it goes.

    • @moe47988
      @moe47988 5 หลายเดือนก่อน

      @@ElliotMunroYou must have some dumb users, quite frankly. 22 years supporting SMB's, non-techie people and they know what phishing is, they never fall for it, and if they're unsure about something they forward it to me first.

    • @moe47988
      @moe47988 5 หลายเดือนก่อน +1

      @@ElliotMunro Also, with all of these "new subjects" that are probably enjoyable for you to teach to people, you risk overwhelming them, they won't retain any of it, they'll just freeze up and disregard it all. Keep it simple.

  • @LazyLewisTV
    @LazyLewisTV 5 หลายเดือนก่อน

    Or… just require all users to use passkey or fido

  • @bite-sizedshorts9635
    @bite-sizedshorts9635 5 หลายเดือนก่อน

    One problem is using software that requires you to be online to use it. I have all my software on my own computer, and it's all 100% mine. The internet fails a lot in my area, and I don't want to be hindered in my work or play by lame software that I can't 100% own. I don't want MFA for anything. I just want to use my own passwords. I don't use a password manager as I'm perfectly capable of keeping a list of them. I'm the only one who can access my computer, and that computer is the only device I use.

  • @vitoraquino88
    @vitoraquino88 5 หลายเดือนก่อน

    Apologies for my stupidity but how the victim is getting the code if the victim is not in the Microsoft Page?
    Thanks

    • @GrannyDryden
      @GrannyDryden 5 หลายเดือนก่อน +1

      Because of a stored previous authenticated session kept in the browser as a cookie.

    • @ElliotMunro
      @ElliotMunro  5 หลายเดือนก่อน +1

      No problem! The attacker is just relaying the actual Microsoft login page to the user via a fake URL and intercepting everything exchanged between the user and the login page, including the password from the user, and the authentication cookie returned by Microsoft after the user completes the MFA process..

  • @RobS7N
    @RobS7N 5 หลายเดือนก่อน

    This is exactly why I use Microsoft ZERO password authentication 😊

  • @ralanham76
    @ralanham76 5 หลายเดือนก่อน +1

    Long ad 🤦‍♂️

    • @ElliotMunro
      @ElliotMunro  5 หลายเดือนก่อน +3

      This was initially a customer facing video for our existing clients that’s taken off :)

    • @CarlyCuckington
      @CarlyCuckington 5 หลายเดือนก่อน

      It is an Ad but its useful as this has happened at work before, I knew how it worked in practice but it was nice to see the tools they actually use to do this.

  • @adamm.1367
    @adamm.1367 5 หลายเดือนก่อน

    Mfa is an important component, but it cannot be relied on alone! Augment with conditional access and geo fencing policies 👍

  • @luckbeforeleap
    @luckbeforeleap 5 หลายเดือนก่อน +3

    This only works because the user did not use a phishing-resistant form of 2FA ? If the user had used the MS Authenticator app (with push notification to the device), I presume this would not work.

    • @ElliotMunro
      @ElliotMunro  5 หลายเดือนก่อน +9

      Unfortunately this attack still works against Microsoft Authenticator with push notifications. I’ve seen a few videos testing it and it still steals the authenticated cookie

    • @luckbeforeleap
      @luckbeforeleap 5 หลายเดือนก่อน +1

      @@ElliotMunro But the cookie is tied to the device and won't be accepted by Microsoft Entra if it comes from another device ?

    • @ElliotMunro
      @ElliotMunro  5 หลายเดือนก่อน +4

      @@luckbeforeleap as far as I’ve seen/read, as long as the cookie has the valid authentication token in it Entra ID won’t do any additional checks by default to make sure it’s the same device or browser. Unless you’re using conditional access policies with continuous access evaluation to consistently check that you’re on a compliant device, trusted IP range, or allowed country etc

    • @mcgarnacle21
      @mcgarnacle21 5 หลายเดือนก่อน +5

      @@ElliotMunro You actually just answered my question, which was going to be what would happen if you had conditional access policies in place. Looks like I'll have to look into continuous access evaluation in my environment. Thanks for the great video mate.

    • @caiocc12
      @caiocc12 5 หลายเดือนก่อน +1

      Phishing-resistant not phishing proof. Just a question of automating the process so that the hacker automatically logs in while the user is being phished, relaying the MFA challenge realtime to the victim.

  • @CFArmouredCrewman
    @CFArmouredCrewman 5 หลายเดือนก่อน

    Why the devil in this day and age can’t we totally disable hyperlinks in emails?!!!? Force users to manually LOOK at the URL and copy it manually to their browser if they really want to click on it.
    Stop the Opps I didn’t mean to click that.
    But for some reason gmail and others don’t give that option?

  • @nils4214
    @nils4214 5 หลายเดือนก่อน

    What is the open source tool you are using? calrion? Never heard of it and i can't find anything on google. Could you please put a link to it in the descritpion?

    • @ElliotMunro
      @ElliotMunro  5 หลายเดือนก่อน +1

      It’s called Clarion by HuskyHacks on GitHub. I’ll update the description with a link when I’m back at my pc :)

  • @wojtek1582
    @wojtek1582 5 หลายเดือนก่อน

    Hmm, I think the first advice should be to not to log on pages which you have entered by clicking on a link in some email. Even more important would be to not to click on links send to you, but enter the service from its main page?

    • @ewicky
      @ewicky 5 หลายเดือนก่อน

      So you're gonna go into a SharePoint from the main page and find a file among millions of other files? No. You're gonna click the link in the email notification from your internal team. C'mon.

    • @wojtek1582
      @wojtek1582 5 หลายเดือนก่อน

      @@ewicky Well, if you ignore/mock basic security measures then I can't help you.

  • @khatharrmalkavian3306
    @khatharrmalkavian3306 5 หลายเดือนก่อน

    Surely there must be a solution to this... Something that will REALLY make the user suffer without disturbing hackers at all? Bonus points if it gives the company access to the user's DNA and bank account.

  • @elcapitanian
    @elcapitanian 5 หลายเดือนก่อน +1

    Dude first video in 3 years?

    • @ElliotMunro
      @ElliotMunro  5 หลายเดือนก่อน +2

      haha yes I'll make a habit of posting more now - this one's taken off :)

  • @HideBuz
    @HideBuz 5 หลายเดือนก่อน +1

    Scary.

  • @Squidgy55
    @Squidgy55 3 หลายเดือนก่อน

    Fuck, this is happening to me right now. Wtf.

  • @stati5tik
    @stati5tik 5 หลายเดือนก่อน

    as usual, the weakest point are incompetent people.

  • @Raja-ct9xq
    @Raja-ct9xq 5 หลายเดือนก่อน +1

    😂😂😂 99% time- its stupid bad users not the bad technology 😂😂😂😂.

  • @hyperp3132
    @hyperp3132 5 หลายเดือนก่อน

  • @FepXBL
    @FepXBL 5 หลายเดือนก่อน +1

    Phishing isn’t hacking, it’s social engineering… hacking is specifically the penetration of software or hardware using brute force.

  • @gedw99
    @gedw99 5 หลายเดือนก่อน

    fishy fishy

  • @staticmin3
    @staticmin3 5 หลายเดือนก่อน

    Hackers are not breaking in, script kiddy criminals as asking idiots for their credentials and the idiots provide.

  • @handlesshouldntdefaulttonames
    @handlesshouldntdefaulttonames 3 หลายเดือนก่อน

    Hahaha the whole country is in danger

  • @ModeZt
    @ModeZt 5 หลายเดือนก่อน

    How do you recognize a VPN ? Are you blocking "hackers" with public VPNs? Lol

    • @ElliotMunro
      @ElliotMunro  5 หลายเดือนก่อน +4

      Bad actors will try to use vpns in the victims country to get around location-based conditional access policies. Using an Entra ID identity risk policy that triggers on public vpns/anonymous ips, you can require that the user re-complete the MFA authentication, which the attacker won’t be able to do.

  • @mitchellsmith4601
    @mitchellsmith4601 5 หลายเดือนก่อน +11

    Successful use of a phishing attack does not equal “breaking into MFA”. Your video subject is deceptive and dishonest.

    • @moe47988
      @moe47988 5 หลายเดือนก่อน +11

      He didn't say breaking into MFA, he said breaking into MFA enabled accounts. In other words, MFA doesn't matter in this situation.

    • @shizziebizz
      @shizziebizz 5 หลายเดือนก่อน +2

      Mitchell you bully

    • @FriendlyNeighbourhoodLawyer
      @FriendlyNeighbourhoodLawyer 5 หลายเดือนก่อน +1

      First time on TH-cam buddy?

    • @michaelinners5421
      @michaelinners5421 5 หลายเดือนก่อน +2

      I disagree. It's at least defeating the purpose of MFA and giving bad actors access to the protected resources. True, it's not the same as breaking the MFA code itself, but the result is the same.

    • @alexanderwoolley1623
      @alexanderwoolley1623 5 หลายเดือนก่อน

      ​​@@shizziebizzI think this Mitchell guy is just projecting his own insecurities, he does work at Optus after all....

  • @Rec4Tech
    @Rec4Tech 5 หลายเดือนก่อน

    WOW! Thanks for sharing @GCIT