{"id":6054,"date":"2024-11-20T20:15:51","date_gmt":"2024-11-20T20:15:51","guid":{"rendered":"https:\/\/tech.newat9.com\/index.php\/2024\/11\/20\/usda-stops-credential-phishing-with-fido-authentication\/"},"modified":"2024-11-20T20:15:51","modified_gmt":"2024-11-20T20:15:51","slug":"usda-stops-credential-phishing-with-fido-authentication","status":"publish","type":"post","link":"https:\/\/tech.newat9.com\/index.php\/2024\/11\/20\/usda-stops-credential-phishing-with-fido-authentication\/","title":{"rendered":"USDA Stops Credential Phishing with FIDO Authentication"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p>As the saying goes, malicious actors don\u2019t break in\u2014they log in. There&#8217;s a significant truth in that statement. Today, many organizations struggle to protect their staff from credential phishing, a challenge that&#8217;s only grown as attackers increasingly execute \u201cMFA bypass\u201d attacks.\u00a0<\/p>\n<p>In an MFA bypass attack, threat actors use social engineering techniques to trick victims into providing their username and password on a fake website. If victims are using \u201clegacy MFA\u201d (such as SMS, authenticator apps, or push notifications), the attackers simply request the MFA code or trigger the push notification. If they can convince someone to reveal two pieces of information (username and password), they can likely manipulate them into sharing three (username, password, and MFA code or action).\u00a0<\/p>\n<p>Make no mistake\u2014any form of MFA is better than no MFA. But recent attacks make it clear: legacy MFA is no match for modern threats. So, what can organizations do? Sometimes a case study can answer that question.<\/p>\n<p>Today, CISA and the USDA are releasing a <a href=\"https:\/\/cisa.gov\/resources-tools\/resources\/phishing-resistant-multi-factor-authentication-mfa-success-story-usdas-fast-identity-online-fido\" target=\"_blank\" rel=\"noopener\">case study<\/a> that details the USDA\u2019s deployment of FIDO capabilities to approximately 40,000 staff. While most of their staff have been issued government-standard Personal Identity Verification (PIV) smartcards, this technology is not suitable for all employees, such as seasonal staff or those working in specialized lab environments where decontamination procedures could damage standard PIV cards. This case study outlines the challenges the USDA faced, how they built their identity system, and their recommendations to other enterprises. Our personal favorite recommendation: &#8220;Always be piloting&#8221;.<\/p>\n<p>FIDO authentication addresses MFA-bypass attacks by using modern cryptographic techniques built into the operating systems, phones, and browsers we already use. Single sign-on (SSO) providers and popular websites also support FIDO authentication.\u00a0<\/p>\n<p><em>Here\u2019s the remarkable part about FIDO: even if malicious actors craft a convincing scheme to steal staff credentials, and the staff comply, the attackers still won\u2019t be able to compromise the account.\u00a0<\/em><\/p>\n<p>The USDA\u2019s success story should inspire all enterprises to migrate to FIDO authentication. Customers expect their providers to take security seriously, and given today\u2019s threat landscape, organizations must ensure they are mitigating one of the most common and effective attack vectors.<\/p>\n<p>You can read the full case study here: <a href=\"https:\/\/cisa.gov\/resources-tools\/resources\/phishing-resistant-multi-factor-authentication-mfa-success-story-usdas-fast-identity-online-fido\" target=\"_blank\" rel=\"noopener\">Phishing-Resistant Multi-Factor Authentication (MFA) Success Story: USDA\u2019s Fast IDentity Online (FIDO) Implementation<\/a><\/p>\n<p>For more information, please see these other publications and resources:\u00a0<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/www.cisa.gov\/news-events\/news\/usda-stops-credential-phishing-fido-authentication\" target=\"_blank\" rel=\"noopener\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As the saying goes, malicious actors don\u2019t break in\u2014they log in. There&#8217;s a significant truth in that statement. Today, many [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/tech.newat9.com\/index.php\/wp-json\/wp\/v2\/posts\/6054"}],"collection":[{"href":"https:\/\/tech.newat9.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tech.newat9.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tech.newat9.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tech.newat9.com\/index.php\/wp-json\/wp\/v2\/comments?post=6054"}],"version-history":[{"count":0,"href":"https:\/\/tech.newat9.com\/index.php\/wp-json\/wp\/v2\/posts\/6054\/revisions"}],"wp:attachment":[{"href":"https:\/\/tech.newat9.com\/index.php\/wp-json\/wp\/v2\/media?parent=6054"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tech.newat9.com\/index.php\/wp-json\/wp\/v2\/categories?post=6054"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tech.newat9.com\/index.php\/wp-json\/wp\/v2\/tags?post=6054"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}