Microsoft: Using multi-factor authentication blocks 99.9% of account hacks

Microsoft: Using multi-factor authentication blocks 99.9% of account hacks 1

Microsoft says that users who enable multi-factor authentication (MFA) for their accounts will end up blocking 99.9% of automated attacks.

The recommendation stands not only for Microsoft accounts but also for any other profile, on any other website or online service.

If the service provider supports multi-factor authentication, Microsoft recommends using it, regardless if it’s something as simple as SMS-based one-time passwords, or advanced biometrics solutions.

“Based on our studies, your account is more than 99.9% less likely to be compromised if you use MFA,” said Alex Weinert, Group Program Manager for Identity Security and Protection at Microsoft.

Passwords don’t matter anymore

Weinert said that old advice like “never use a password that has ever been seen in a breach” or “use really long passwords” doesn’t really help.

He should know. Weinert was one of the Microsoft engineers who worked to ban passwords that became part of public breach lists from Microsoft’s Account and Azure AD systems back in 2016. As a result of his work, Microsoft users who were using or tried to use a password that was leaked in a previous data breach were told to change their credentials.

But Weinert said that despite blocking leaked credentials or simplistic passwords, hackers continued to compromise Microsoft accounts in the following years.

He attributed this to the fact that passwords or their complexity don’t really matter anymore. Nowadays, hackers have different methods at their disposal to get their hands on users’ credentials, and in most cases, the password doesn’t matter.

Attack

Also known as . . .

Frequency      

Difficulty: Mechanism

User assists attacker by . . .

Does your password matter?

Credential Stuffing

Breach replay, list cleaning

Very high – 20+M accounts probed daily in MSFT ID systems

Very easy: Purchase creds gathered from breached sites with bad data at rest policies, test for matches on other systems. List cleaning tools are readily available.

Being human. Passwords are hard to think up. 62% of users admit reuse.

No – attacker has exact password.

Phishing

Man-in-the-middle, credential interception

Very high. 0.5% of all inbound mails.

Easy: Send emails that promise entertainment or threaten, and link user to doppelganger site for sign-in. Capture creds. Use Modlishka or similar tools to make this very easy.

Being human. People are curious or worried and ignore warning signs.

No – user gives the password to the attacker

Keystroke logging

Malware, sniffing

Low.

Medium: Malware records and transmits usernames and passwords entered, but usually everything else too, so attackers have to parse things.

Clicking links, running as administrator, not scanning for malware.

No – malware intercepts exactly what is typed.

Local discovery

Dumpster diving, physical recon, network scanning.

Low.

Difficult: Search user’s office or journal for written passwords. Scan network for open shares. Scan for creds in code or maintenance scripts.

Writing passwords down (driven by complexity or lack of SSO); using passwords for non-attended accounts

No – exact password discovered.

Extortion

Blackmail, Insider threat

Very low. Cool in movies though.

Difficult: Threaten to harm or embarrass human account holder if credentials aren’t provided.

Being human.

No – exact password disclosed

Password spray

Guessing, hammering, low-and-slow

Very high – accounts for at least 16% of attacks. Sometimes 100s of thousands broken per day. Millions probed daily.

Trivial: Use easily acquired user lists, attempt the same password over a very large number of usernames. Regulate speed and distributed across many IPs to avoid detection. Tools are readily and cheaply available. See below.

Being human.

Using common passwords such as qwerty123 or Summer2018!

No, unless it is in the handful of top passwords attackers are trying.

Brute force

Database extraction, cracking

Very low.

Varies: Penetrate network to extract files. Can be easy if target organization is weakly defended (e.g. password only admin accounts), more difficult if appropriate defenses of database, including physical and operation security, are in place. Perform hash cracking on password. Difficulty varies with encryption used. See below.

None.

No, unless you are using an unusable password (and therefore, a password manager) or a really creative passphrase. See below.

With over 300 million fraudulent sign-in attempts targeting Microsoft cloud services every day, Weinert says that enabling a multi-factor authentication solutions blocks 99.9% of these unauthorized login attempts, even if hackers have a copy of a user’s current password.

The 0.1% number accounts for more sophisticated attacks that use technical solutions for capturing MFA tokens, but these attacks are still very rare when compared to the daily hum of credential stuffing botnets.

Google said the same thing in May

Microsoft’s boast that using MFA blocks 99.9% of automated account takeover (ATO) attacks isn’t the first of its kind.

Back in May, Google said that users who added a recovery phone number to their accounts (and indirectly enabled SMS-based MFA) were also improving their account security.

“Our research shows that simply adding a recovery phone number to your Google Account can block up to 100% of automated bots, 99% of bulk phishing attacks, and 66% of targeted attacks that occurred during our investigation,” Google said at the time.

When both Google and Microsoft are recommending the same thing, it’s probably a good time to start following their advice.

Microsoft: Using multi-factor authentication blocks 99.9% of account hacks 2
About the author

E-Crypto News was developed to assist all cryptocurrency investors in developing profitable cryptocurrency portfolios through the provision of timely and much-needed information. Investments in cryptocurrency require a level of detail, sensitivity, and accuracy that isn’t required in any other market and as such, we’ve developed our databases to help fill in information gaps.

Related Posts

E-Crypto News Executive Interviews



bitcoin
Bitcoin (BTC) $ 42,422.00
ethereum
Ethereum (ETH) $ 2,883.22
cardano
Cardano (ADA) $ 2.26
tether
Tether (USDT) $ 1.00
binance-coin
Binance Coin (BNB) $ 345.78
xrp
XRP (XRP) $ 0.932598
solana
Solana (SOL) $ 131.95
usd-coin
USD Coin (USDC) $ 0.998041
polkadot
Polkadot (DOT) $ 28.98
dogecoin
Dogecoin (DOGE) $ 0.206549
USD
EUR
GBP
bitcoinBitcoin (BTC)
$ 42,422.00
ethereumEthereum (ETH)
$ 2,883.22
tetherTether (USDT)
$ 1.00
bitcoin-cashBitcoin Cash (BCH)
$ 508.51
litecoinLitecoin (LTC)
$ 149.12
bitcoinBitcoin (BTC)
36.142,27
ethereumEthereum (ETH)
2.456,42
tetherTether (USDT)
0,851970
bitcoin-cashBitcoin Cash (BCH)
433,24
litecoinLitecoin (LTC)
127,05
bitcoinBitcoin (BTC)
30,954.70
ethereumEthereum (ETH)
2,103.84
tetherTether (USDT)
0.729685
bitcoin-cashBitcoin Cash (BCH)
371.05
litecoinLitecoin (LTC)
108.81

Automated trading with HaasBot Crypto Trading Bots

Crypto Scams

Crypto Scams
Crypto Scams Still Persistent In 2021, SEC Warns About Red Flags To Watch
September 9, 2021
Poly Network
Here’s How Hackers Stole Over $600 million in the Poly Network Attack
August 12, 2021
The World’s Most Infamous Crypto Hacks and Scams
July 31, 2021
Cryptocurrency Exchanges
Cryptocurrency Exchanges and the Plague of Scams and Bans
June 29, 2021
What Role Do Cryptocurrencies Play In The Era Of Ransomware Attacks?
June 9, 2021

Blockchain/Cryptocurrency Questions and Answers

Beginner’s Guide to Investing in Cryptocurrency
August 9, 2021
Short-Sell Cryptocurrency
How to Short-Sell Cryptocurrency: A Brief Overview
July 17, 2021
Klaytn
What Is Klaytn (KLAY) And How Does It Work?
July 16, 2021
Cryptocurrencies
Our Crypto Roundup Interview Asks- Do Cryptocurrencies Have a Future?
July 15, 2021
Solana
What Is Solana (SOL) And How Does It Work?
June 26, 2021


CryptoCurrencyUSDChange 1hChange 24hChange 7d
Bitcoin42,435 0.80 % 0.88 % 12.08 %
Ethereum2,884.8 1.61 % 2.11 % 15.84 %
Cardano2.260 1.97 % 1.31 % 4.82 %
Tether0.9986 0.03 % 0.08 % 0.23 %
Binance Coin345.86 1.38 % 3.53 % 15.95 %
XRP0.9312 1.06 % 1.69 % 13.44 %
Solana132.11 3.16 % 6.75 % 22.34 %
USD Coin0.9982 0.35 % 0.45 % 0.55 %
Polkadot30.87 2.19 % 17.29 % 10.73 %
Dogecoin0.2070 1.36 % 2.05 % 14.43 %

bitcoin
Bitcoin (BTC) $ 42,422.00
ethereum
Ethereum (ETH) $ 2,883.22
cardano
Cardano (ADA) $ 2.26
tether
Tether (USDT) $ 1.00
binance-coin
Binance Coin (BNB) $ 345.78
xrp
XRP (XRP) $ 0.932598
solana
Solana (SOL) $ 131.95
usd-coin
USD Coin (USDC) $ 0.998041
polkadot
Polkadot (DOT) $ 28.98
dogecoin
Dogecoin (DOGE) $ 0.206549