Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

67 Trojanized GitHub repository found in the company, orientation on gamers and developers

June 20, 2025

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Microsoft MFA AuthQuake issue allowed unlimited brute force attempts without warnings
Global Security

Microsoft MFA AuthQuake issue allowed unlimited brute force attempts without warnings

AdminBy AdminDecember 11, 2024No Comments3 Mins Read
Brute-Force Attempts
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


December 11, 2024Ravi LakshmananVulnerability / Authentication

Brute force attempts

Cybersecurity researchers have identified a “critical” security vulnerability in Microsoft’s implementation of multi-factor authentication (MFA) that allows an attacker to trivially bypass protections and gain unauthorized access to a victim’s account.

“The bypass was simple, taking about an hour to execute, requiring no user interaction, generating no notifications, and giving the account owner no indication of a problem,” Oasis Security researchers Elad Luz and Tal Hassan said in a report shared with The Hacker News.

After responsible disclosure, the question is a code name AuthQuake – Microsoft appealed in October 2024.

Cyber ​​security

As long as the Windows manufacturer supports different ways to authenticate users via MFA, one method involves entering a six-digit code from an authenticator after providing credentials. Up to 10 consecutive failed attempts are allowed per session.

The vulnerability discovered by Oasis essentially concerns the lack of rate limiting and an extended time interval when providing and validating these one-time codes, allowing an attacker to quickly create new sessions and enumerate all possible code permutations (ie one million) without even alerting the victim about failed login attempts.

It should be noted here that such codes are time-based, also called one-time passwords (TOTP), where they are created using the current time as a source of randomness. Moreover, the codes only remain active for about 30 seconds, after which they change.

“However, due to the potential time difference and delays between the validator and the user, the validator is encouraged to accept a larger time window for the code,” Oasis noted. “In short, this means that a single TOTP code can be valid for more than 30 seconds.”

In the case of Microsoft, the New York-based company found that the code was valid for 3 minutes, thus opening up the possibility of a scenario where an attacker could take advantage of the extended time window to initiate new brute-force attempts to simultaneously crack the six-digit code.

“It is important to introduce rate limits and make sure they are properly enforced,” the researchers said. “Furthermore, speed limits may not be enough—consecutive failed attempts should cause the account to be locked.”

Cyber ​​security

Since then, Microsoft has implemented a stricter speed limit that kicks in after a number of failed attempts. Oasis also said the new limit lasts about half a day.

“The recent discovery of the AuthQuake vulnerability in Microsoft’s multi-factor authentication (MFA) serves as a reminder that security is not just about deploying MFA – it must also be properly configured,” said James Scobie, CIO at Keeper Security. the statement said.

“While MFA is undoubtedly a powerful defense, its effectiveness depends on key settings such as rate limiting to prevent brute force attempts and user notifications for failed login attempts. These features are optional; they are important for improving visibility, allowing users to detect suspicious activity early and respond quickly.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

67 Trojanized GitHub repository found in the company, orientation on gamers and developers

June 20, 2025

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

67 Trojanized GitHub repository found in the company, orientation on gamers and developers

June 20, 2025

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

67 Trojanized GitHub repository found in the company, orientation on gamers and developers

June 20, 2025

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.