CISA announced on January 13 that hackers bypassed the protocols Multi-factor authentication (MFA) to breach cloud service accounts. Specifically, its relevant announcement states the following: "CISA is aware of many recent successes cyber attacks aimed at services cloud of various organizations. The hackers involved in these attacks used a variety of techniques and tactics, including Phishing, of attempts Brute Force, and her "Pass-the-cookie" attack - seeking to exploit vulnerabilities in the victim's cloud security practices. "
According to BleepingComputer, the hackers tried to gain access to some of their target assets through brute-force attacks. However, they failed either because they could not guess correctly credentials or because the target organization had multi-factor authentication (MFA) enabled. In at least one case, hackers were able to successfully log in to a user account, even though the target had the MFA enabled.
According to CISA, hackers managed to bypass MFA authentication protocols as part of a "pass-the-cookie" attack. This is a type of attack in which attackers invade an already validated session, using stolen session cookies, to connect to online services or the web. applications.
The agency also noted that intruders used the initial post-phishing access to employee credentials to phishing others. accounts users in the same organization, abusing what looked like the organization's file hosting service to host their malicious attachments.
In other cases, the hackers modified or created promotional rules e-mail and search rules to steal sensitive and financial information from compromised email accounts.
In addition, the FBI warns agencies of fraudulent abuse of web-based email clients BEC (Business Email Compromise) attacks.
CISA also points out that this activity of violating cloud service accounts is not explicitly linked to the cybercriminals behind the attack on its supply chain Solarwinds or any other recent malicious activity.
The CISA attacks regularly target employees who use corporate or personal devices while accessing their organization's cloud services from home. Weak security practices were the main reason behind the success of the attacks.
CISA also provides compromise indicators, as well as tactics, techniques and procedures (TTPs) that can further help managers and security teams respond effectively to attacks targeting their organization and all its "assets". The service also suggests measures that organizations can take to enhance cloud security configurations and prevent attacks targeting their cloud services.