• Tech News
  • Fintech
  • Startup
  • Games
  • Ar & Vr
  • Reviews
  • How To
  • More
    • Mobile Tech
    • Pc & Laptop
    • Security
What's Hot

Apple iPad Pro (M5) review: The best comes at a cost

October 29, 2025

Down Cemetery road spoiler-free review: Slow Horses fans won’t want to miss this

October 29, 2025

How Background App Refresh Really Works on Your iPhone

October 28, 2025
Facebook Twitter Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook Twitter Instagram Pinterest VKontakte
Behind The ScreenBehind The Screen
  • Tech News
  • Fintech
  • Startup
  • Games
  • Ar & Vr
  • Reviews
  • How To
  • More
    • Mobile Tech
    • Pc & Laptop
    • Security
Behind The ScreenBehind The Screen
Home»Tech News»Growing MFA use spurs ‘pass-the-cookie’ attacks
Tech News

Growing MFA use spurs ‘pass-the-cookie’ attacks

August 18, 2022No Comments4 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Growing MFA use spurs ‘pass-the-cookie’ attacks
Share
Facebook Twitter LinkedIn Pinterest Email

The tried-and-true strategy of utilizing stolen session cookies to bypass multifactor authentication (MFA) protections and achieve entry to key methods has elevated massively in latest months, in accordance with intelligence printed as we speak by Sophos.

Such assaults – also known as pass-the-cookie assaults – are in fact nothing new. Certainly, they’ve lengthy been a longtime device within the cyber prison’s arsenal as a result of, in the end, they permit attackers to imagine the persona of a official person and do something the official person can.

In June 2022, Microsoft spilled the beans on a large-scale phishing marketing campaign that hit 10,000 of its clients through the use of phishing websites to steal passwords, hijack sign-in classes, and bypass top-of-the-line MFA options. And there have been a number of warnings earlier than that, together with an alert from US cyber authority CISA in early 2021.

They work like this. A session or authentication cookie, which is saved by an internet browser when a person logs right into a web-based useful resource, can, if stolen, be injected into a brand new internet session to trick the browser into considering the authenticated person is current and doesn’t must show their id. As a result of such a token can also be created and saved on an internet browser when MFA is in play, the identical method can handily be used to bypass it.

This drawback is compounded by the truth that many web-based purposes have long-lived cookies that hardly ever expire, or solely achieve this if the person particularly logs out of the service.

See also  Microsoft Dev Box now ready for developers to try cloud-powered workstations

In a brand new report, Cookie stealing: the brand new perimeter bypass, Sophos’s newly established X-Ops unit stated these assaults have gotten more and more prevalent because of the rising recognition of MFA instruments.

Entry to pass-the-cookie assaults is trivial for a risk actor, stated X-Ops – in lots of circumstances, all they would wish to do is get hold of a duplicate of an infostealer, reminiscent of Raccoon Stealer, to gather credential knowledge and cookies in bulk and promote them on to others – even ransomware gangs – on the darkish internet.

“Attackers are turning to new and improved variations of data stealing malware to simplify the method of acquiring authentication cookies – also called entry tokens,” stated Sean Gallagher, principal risk researcher at Sophos. “If attackers have session cookies, they will transfer freely round a community, impersonating official customers.”

In lots of circumstances, stated X-Ops, the act of cookie theft is changing into a way more extremely focused assault, with adversaries scraping cookie knowledge from inside a community and utilizing official executables to cover their exercise.

In a single case that Sophos responded to, an attacker used an exploit package to ascertain entry, after which a mix of the Cobalt Strike and Meterpreter instruments to abuse a official compiler device and scrape entry tokens. They spent months inside their sufferer’s community gathering cookies from the Microsoft Edge browser.

The top purpose is to acquire entry to the sufferer’s web-based or cloud-hosted sources, which might then be used for additional exploitation, reminiscent of enterprise e mail compromise, social engineering to achieve entry to extra methods, and even modification of the sufferer’s knowledge or supply code repositories.

See also  Vodafone upgrades global network with SDN for flexible scalability

“Whereas traditionally we’ve seen bulk cookie theft, attackers are actually taking a focused and exact strategy to cookie stealing,” stated Gallagher. “As a result of a lot of the office has change into web-based, there actually is not any finish to the forms of malicious exercise attackers can perform with stolen session cookies.

“They will tamper with cloud infrastructures, compromise enterprise e mail, persuade different staff to obtain malware and even rewrite code for merchandise. The one limitation is their very own creativity.”

Gallagher added: “Complicating issues is that there isn’t any straightforward repair. For instance, companies can shorten the lifespan of cookies, however which means customers should re-authenticate extra typically, and, as attackers flip to official purposes to scrape cookies, firms want to mix malware detection with behavioural evaluation.”

Source link

attacks growing MFA passthecookie spurs
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Apple Alerts Journalists and Activists to Mercenary Spyware Attacks

May 1, 2025

Protect against iPhone password reset attacks: How-to

March 28, 2024

Apple Security Researchers Identify Three Actions That Leave Users Open to Attacks

March 1, 2024

Apple Hardens iMessage Against Quantum Computing Attacks

February 21, 2024
Add A Comment

Comments are closed.

Editors Picks

This supply chain startup is using AI and IoT to predict food spoilage – Startup

February 5, 2023

Grounded hits full release in September

July 30, 2022

WWDC25 Showed Apple at Its Best

June 13, 2025

Iran Says Face Recognition Will ID Women Breaking Hijab Laws

January 10, 2023

Subscribe to Updates

Get the latest news and Updates from Behind The Scene about Tech, Startup and more.

Top Post

Apple iPad Pro (M5) review: The best comes at a cost

Down Cemetery road spoiler-free review: Slow Horses fans won’t want to miss this

How Background App Refresh Really Works on Your iPhone

Behind The Screen
Facebook Twitter Instagram Pinterest Vimeo YouTube
  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2025 behindthescreen.fr - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.