- Regular phishing awareness should be done in the organization.
- Regular 2FA/MFA hacking awareness should be done in the organization.
- The Phishing campaign should be run internally in the organization to check the employee's awareness.
- Reward the employees if they successfully pass the phishing internal check. So that all other employees remember it.
- Reward the employees who tell about the phishing email or any phishing activity. This creates a positive impact in the organization and the team.
- The common misconception people have with the standard form of MFA (SMS, Touch, Push) is that it prevents social engineering. Although it MFA protects against an attack, it's commonly still vulnerable to a MITM phishing attack. Check the example of Uber Hack 2022
- Take a regular quiz related to phishing and reward some of the employees who pass the quiz. This will motivate others.
- Always check the domain name while entering the username and password. Make this a habit.
- Block phishing emails and phishing URLs.
- Always enable MFA in all the online services to make it harder to hack for an attacker.
- Enable MFA for sensitive/important privilege services. Example: If a valid user already logged into the app and they try to add a new user, the app should again ask for MFA. This practice decreases the overall attack scope.
- Use certificate-based authentication. It reduces insecure password practices and also bruteforce-related vulnerabilities.
- Implement continuous monitoring on your digital services. Like location change, machine change, etc.
- Avoid password reuse and use a strong password.
- Stop using SMS MFA and start using push notifications like Ping ID, FIDO2, Touch ID, Face ID, etc like this.
- Don't use untrusted public internet for connecting the VPN for accessing the organization's services.
- Implement User/Entity Behavior Analytics (UEBA) in your organization.
- Apply access restrictions like VPN connectivity only done with the compliant device only. (Example: the use of a certificate for login into the VPN service or a certain location is required for login [IP Fence])
- Use Anti-Phishing solutions.
- Implement Brand monitoring solutions like Brandshield that regularly scan the Internet and try to find anything related to the brand and report that.
- The best defense is to use U2F (Universal 2nd Factor). It's a hardware device that uses cryptography to prevent MITM phishing and phishing attack.
How does U2F (Universal 2nd Factor) prevent the MITM and phishing (Simple Explanation)
- A user generates the public and private keys.
- A user registers the public key with services like Google if a user wants to implement the U2F on Google.
- When a user tries to log in to Google, the Google server sends a random challenge to the client browser.
- The U2F creates the digital signature by using the private key of both the challenge and the domain of the website that the user is actually on.
So if an attacker uses MITM phishing, the domain that is digitally signed by the private key can't be used by the real domain.
Example:
An attacker uses go0le.com the user's browser creates the digital signature for go0le.com. If the attacker uses MITM phishing and forwards the request to the actual google.com. The real goole.com can't validate the signature created for go0le.com. In this way, it protects against phishing and MITM.
Comments
Post a Comment