Header of Eye Security GmbH

Is MFA dead? Live hack & defense demo - how hackers bypass MFA

Digital identities are a lucrative target for cybercriminals. How common MFA procedures are circumvented + how to protect yourself against them.

Topic

Trend topic

When & Where

calendar_month

Tue, 10/22/2024, 17:00 - 17:30

location_on

Forum, Booth 6-215

Download session as iCaldownload_for_offline

Details

  • Format:

    Technology lecture

Session description

Today, digital identities are a lucrative target for cybercriminals. They are the gold and oil of the digital age and enable access to a wide range of services, such as online banking, email or direct access to company networks and resources. 

For this reason, various organizations and regulations recommend or require the use of multifactor authentication (MFA) to reduce the threat of compromised credentials. Unfortunately, not all MFA methods used are resistant to attacks. Depending on the method, they are vulnerable to phishing, exploitation of vulnerabilities in System 7 (SS7), push bombing or SIM swap attacks. If these attacks are used successfully, attackers can gain access to MFA credentials or bypass MFA completely to gain access to MFA-protected systems.
...

Speaker

Moderator