vz-risk / veris

Vocabulary for Event Recording and Incident Sharing (VERIS)
http://verisframework.org
Other
565 stars 161 forks source link

How to capture MFA bypass techniques #452

Open planglois925 opened 1 year ago

planglois925 commented 1 year ago

Currently there isn't a good way of capturing MFA bypass, in which there is a secondary action that is leveraged to bypass MFA.

Here are the types of attacks that are known:

  1. Auth approving spamming (spam the user until they accept the auth)
  2. Steal cookies (local host) - Password stealers like redline can steal both credential and active cookies that can be used to bypass MFA)
  3. Steal cookies (website) - Attackers can collect the second factor through a typical phishing site
  4. SMS Hijack - through SIM swapping the attacker can steal the second factor that is sent via SMS
  5. Brute-force second factor
  6. Direct Social engineering (To confirm your account, can you provide the validation code)
  7. Malicious app on phone intercepting MFA code

Potentially out of scope

  1. Misconfigured services - while the organization may have implemented MFA, they may have left certain services to not need it
  2. Unactivated MFA accounts - organization has set up MFA, but the compromised user hadn't set it up
planglois925 commented 1 year ago

Options to capture social engineering MFA prompt exhaustion:

_philnote: if we use the same term for this as hacking.brute forcing and malware brute force, they'll get aggregated together, even tho they are conceptually different from a protection stand point)

2,3,7 Phishing site + malware password dumper are probably fine to capture using existing social varieties and malware. From a defensive perspective, it makes sense to group these together since they are defended in the same way.

SMS Hijacking (MFA Intercept)

gdbassett commented 1 year ago

Is SIM an asset? Is MFA a type of data?

Intercept may be a good but not interactive (confidentiality loss) Hijack (Attacker gains the ability to act as the victim and denies it to the victim)

Add: SIM asset (media? physical?) hijack action (which categories - hacking) Social brute force Multiple Authentication Factor data variety (any credential or other authentication factor in addition to the first)

Coding_style: