Podcast
Root Causes 335: When MFA Is Not MFA


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
September 29, 2023
In this episode we describe a social engineering attack to steal a one-time password (OTP) to enable unauthorized access. This incident further exploited a cloud backup feature to extend the scope of the breach. We explain.
Podcast Transcript
Lightly edited for flow and brevity.
In this case – and I’m gonna try and simplify it here, right. Basically, a lot of enterprises will use Google’s G-Suite. It’s not surprising. It’s very, very common for enterprises to be able to use that and so geez, if you are an attacker, what a great thing to try to get access to. So, the bad guy was trying to get access into G-Suite of one of these administrators and was able to because the person was socially engineered and the attacker was able to log in to G-Suite of this administrator, or the enterprise, because of the fact that they received this OTP via social engineering. However, however, you might think, well, what is that attacker going to be able to get access to? Well, obviously, documents and files that are saved in G-Suite and email and other things but it was far worse than that because of this reason. Retool figured, well look, MFA is MFA. You are not gonna be able to log into our other internal systems.
The problem with that assumption was this. April 24, 2023 Google announced that cloud backup of basically your OTP seeds is possible. So, in other words, all of your OTP accounts that you have one time passwords against will be saved into the cloud.
Now, super handy feature – super handy feature for legitimate purposes because then you can go from device to device and you can have a single instance of Google Authenticator running and you can actually say, hey, look, I don’t want to have to go off and reseed this mobile device. I want to be able to just get it from the cloud.

