Podcast
Root Causes 249: What Is MFA Exhaustion?


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
October 21, 2022
Recent months have seen several high profile attacks that were enabled by defeating the MFA accompanying user name and password login. In this episode we explain the concept of MFA fatigue and why it is an enabler for these attacks.
Podcast Transcript
Lightly edited for flow and brevity.
So, think about how many systems you have, Tim, where you are using some form of one-time passcode that’s generated by goodness knows what. It could be an app on your desktop. It could be an app on our mobile device and you are asked to type in or copy/paste, whatever it is, that one-time passcode. Right on. There’s so many one-time passcode form factors that are out there and they are basically all vulnerable to this because the one-time passcode generation is essentially whenever you are dealing with a system that has some kind of a push notification to say, hey, you are trying to log into this, please respond with the one-time passcode or please respond with basically the confirmation of the log in. And any type of system that does anything like that is going to be vulnerable because if the bad guy does get a hold of your username and password – we’ve talked endlessly about the different ways that can happen – basically that bad guy can then brute force to log in as you. In order, of course, to complete the authentication, they need you to complete the MFA challenge, which could be the entry of a one-time passcode. It could be basically clicking on a button that says, yes, this is me. Please log in. And we are now seeing more and more examples of bad guys just deciding I’m going to bombard the victim with logging in until they finally click whatever they need to click to let me in as the attacker. That’s why we call it MFA fatigue and it’s not because the system in malfunctioning; it’s not because the attacker has broken anything. The attacker does need to at least be able to get to the point where they prompt you which typically means they need to have achieved the goal of stealing the credential of your username and password, which is only one-half of what they need. The second half of what they need is to have you simply click on the button that has the proper privileges that completes the authentication. I think any of us, Tim, could be vulnerable to that. This is the reason why I wanted to call it out on its own podcast is just to let everybody know.
If you start seeing a surprising prompt. Hey, I didn’t try to log into this. Well, would I question this every single time. I think, Tim, we see so many one-time password code or MFA prompts – let’s just call it that. MFA prompts in general in our lives, we almost can’t keep them straight anymore, Tim. Remember you and I have made this joke before. Back in the old day when we all had the hard tokens, the good old RSA things that we would carry around. If you had to have multiple systems we’d have to carry around multiple pieces of hardware and it just got kind of crazy after a while and then in walks software-based tokens and hallelujah, that solved everything. Well, now our lives, Tim, are just so MFA inundated. I got news for you – I have so many different MFA systems that I have to log into, if you were to ask me, Jay, name me every MFA system that you have to interact with on a daily basis, I bet you I couldn’t even list them all. I would forget.
And so, therefore, if I randomly got a log in that comes up and I tell you, even where I have my own fatigue, Tim, is corporate policies - - and by the way, this is not my current employer. This is every employer that I’ve ever seen, other people I’ve ever worked with; this is across the board. Quite often, you remember, Tim, where there used to be policies of password changes need to happen every 90 days or whatever it was and that was a pain in the butt.
Imagine if people randomly came up to you with your door lock for your personal house, walked up to you just with your door lock and said, hey, put your key in her and turn it otherwise something is not gonna work for you today. That’s what you are being taught to do. Well, at some point, the bad guy, especially with MFA and the ease of stealing username and passwords you are gonna be prompted over and over and over again with some sort of challenge to a legitimate system and you might not know what system is challenging you. Even if you do know what system is challenging you, you might say to yourself, oh, this must be some kind of IT glitch. I don’t really care. I just want these messages to go away. I will complete the authentication challenge. And guess what? We now have the Uber breach. We now have other breaches that we are hearing about as well, Tim. This is a big issue – wanted to call it out.

