{"id":26761,"date":"2022-08-11T08:34:04","date_gmt":"2022-08-11T12:34:04","guid":{"rendered":"https:\/\/www.technewsday.com\/?p=26761"},"modified":"2022-08-12T10:41:59","modified_gmt":"2022-08-12T14:41:59","slug":"mfa-fatigue-help-attackers-breach-cisco-corporate-network","status":"publish","type":"post","link":"https:\/\/technewsday.com\/staging\/mfa-fatigue-help-attackers-breach-cisco-corporate-network\/","title":{"rendered":"&#8220;MFA Fatigue&#8221; Help Attackers Breach Cisco Corporate Network"},"content":{"rendered":"<p id=\"arIndex_1\" data-ar-index=\"1\">Cisco has confirmed a ransomware attack on its corporate network that happened in late May.<\/p>\n<p data-ar-index=\"1\">Behind the attack was the Yanluowang Ransomware gang. According to Cisco, the attackers were able to steal non-sensitive data from a box folder linked to the account of a compromised employee.<\/p>\n<p id=\"arIndex_2\" data-ar-index=\"2\">MFA fatigue was critical to helping the attacker break through Cisco&#8217;s network. MFA fatigue is also known as MFA prompt spamming. After gaining access to compromised login credentials, a hacker tricks a user by repeatedly sending push notifications to authorize the login.<\/p>\n<p id=\"arIndex_3\" data-ar-index=\"3\">Through MFA fatigue and a series of sophisticated voice phishing attacks that faked trusted support organizations, the attacker convinced the CISCO employee to accept multi-factor authentication (MFA) push notifications.<\/p>\n<p id=\"arIndex_4\" data-ar-index=\"4\">The employee was eventually tricked into accepting one of the MFA notifications. The attackers then gained access to the VPN in the context of the target user.<\/p>\n<p id=\"arIndex_5\" data-ar-index=\"5\">After gaining access to the corporate network, the Yanluowang operators spread laterally to Citrix servers and domain controllers.<\/p>\n<p id=\"arIndex_6\" data-ar-index=\"6\">The attackers used enumeration tools such as ntdsutil, adfind, and secretsdump to collect more information after accessing domain administrators, and then installed a number of payloads on compromised systems, including a backdoor.<\/p>\n<p id=\"arIndex_7\" data-ar-index=\"7\">Their activities were discovered by Cisco and eventually driven out of the environment.<\/p>\n<p id=\"arIndex_8\" data-ar-index=\"8\">The sources for this piece include an article in <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisco-hacked-by-yanluowang-ransomware-gang-28gb-allegedly-stolen\/\" target=\"_blank\" rel=\"noopener\">BleepingComputer<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cisco has confirmed a ransomware attack on its corporate network that happened in late May. Behind the attack was the Yanluowang Ransomware gang. According to Cisco, the attackers were able to steal non-sensitive data from a box folder linked to the account of a compromised employee. MFA fatigue was critical to helping the attacker break [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[34,57,17,16],"tags":[416,388,393],"class_list":["post-26761","post","type-post","status-publish","format-standard","hentry","category-artificial-intelligence","category-companies","category-data-analytics","category-security","tag-cisco-systems","tag-privacy-security","tag-security-strategies"],"acf":[],"_links":{"self":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/26761","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/comments?post=26761"}],"version-history":[{"count":4,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/26761\/revisions"}],"predecessor-version":[{"id":26766,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/26761\/revisions\/26766"}],"wp:attachment":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/media?parent=26761"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/categories?post=26761"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/tags?post=26761"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}