<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.zwirentitle.com/blogs/tag/password-security/feed" rel="self" type="application/rss+xml"/><title>Zwiren Title Agency, Inc - ZTA Blog #Password Security</title><description>Zwiren Title Agency, Inc - ZTA Blog #Password Security</description><link>https://www.zwirentitle.com/blogs/tag/password-security</link><lastBuildDate>Fri, 03 Apr 2026 14:37:43 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Even with MFA Enabled, Password Security Still Matters! ]]></title><link>https://www.zwirentitle.com/blogs/post/how-hackers-are-bypassing-mfa</link><description><![CDATA[Multifactor authentication is an incredibly effective security measure to add to accounts. However, we are now learning of hackers being able to bypass multifactor authentication using social engineering methods, such as fake websites. Learn how you can stay secure.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_cJ2NvhlxSHqL1LHPmu0QDQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_MwbBNeyyRBervbVCbXUS0w" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_VcVyPe1HToqPSxOixZmoUA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_dCaV2OweR5uf1xkozqIvTA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span style="font-size:26px;">Even with Multifactor Authentication (MFA) Enabled, Password Security Still Matters</span><br/><span style="font-size:18px;">​How Hackers are Bypassing MFA</span></h2></div>
<div data-element-id="elm_9YA4UcMVSEKQCahryV1toQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p></p><div><p></p></div>
<p></p><span style="text-align:left;"><div style="text-align:justify;"> Setting up security measures does not mean you’re off the hook for being vigilant. It seems that every time a new security measure is introduced, it isn’t long before hackers find a way to circumvent those measures. Multifactor authentication (MFA) is an incredibly effective security measure to add to accounts. However, we are now learning of hackers being able to bypass multifactor authentication using social engineering methods, such as fake websites. </div></span><blockquote style="margin-left:40px;border:none;"><blockquote style="margin-left:40px;border:none;"><div><p style="text-align:left;">&nbsp;</p></div>
</blockquote><blockquote style="margin-left:40px;border:none;"><div><p style="text-align:left;"><b><span style="font-size:18px;">1.&nbsp;Adversary in the middle (AITM) Attack</span></b></p></div>
</blockquote><div><p style="text-align:left;">AiTM attacks are similar to what we’ve seen from hackers in the past, with a unique new spin. Hackers are creating fake websites that look almost identical to legitimate websites. These fake websites are used to deceive users into believing they are logging into a real account. Users will enter in their login credentials into the hacker’s fake website, and as soon as hackers see the credentials are entered, they use those credentials to log in to the actual website, which will trigger the multifactor authentication email or text message or phone alert to get sent to the user. The user then enters in the code on the fake website, which the hackers then use as the code to log in to the actual website</p></div>
<div><p style="text-align:left;">&nbsp;</p></div><div><p style="text-align:left;"><b>Prevention</b>: These fake websites are typically sent out via phishing emails, or spear phishing emails. Spear phishing is a form of phishing that targets specific individuals or organizations. The most basic solution for preventing yourself from falling victim to this form of an AiTM attack is not clicking the link in the email. When users receive emails with a link to view or sign into an account, don’t use the link in the email to get to the log in page. Open up a new tab or window in the browser and type in the URL, or Google search the company to find the login page, or even open up the mobile application to sign in.&nbsp;</p><p style="text-align:left;">Just DON’T CLICK THE LINK!</p></div>
<div><p style="text-align:left;">&nbsp;</p></div><div><blockquote style="margin-left:40px;border:none;"><div><p style="text-align:left;"><b><span style="font-size:18px;">2.&nbsp;MFA Prompt Bombing / MFA Fatigue Attack</span></b></p></div>
</blockquote></div><div><p style="text-align:left;">Some mobile applications offer multifactor authentication in the form of a notification being sent to a smartphone, which opens the mobile application and gives the user the option to approve or deny the login attempt. MFA Prompt Bombing is a tactic hackers have started using after compromising a password (through the usual methods of phishing emails, etc). The hacker will attempt to log in to a user’s account, which sends the user’s phone the notification for approval. The user may find it rather unexpected, so they deny the notification. The hacker will then attempt to log in again, sending a second notification to the user’s phone. The user denies it again.&nbsp; The hacker will continually attempt to log in, spamming the user with MFA notifications, hoping that eventually, the user will either click approve by accident or get so fed up with the notifications, that they click approve to make it stop.</p></div>
<div><p style="text-align:left;">&nbsp;</p></div><div><p style="text-align:left;"><b>Example:</b>&nbsp;In one instance, when Uber was hacked in 2022, an external contractor was on the receiving end of the MFA Prompt Bombing received a message on WhatsApp from the attacker, pretending to be Tech Support. The message advised the user to accept the MFA prompt. This message is what caused the attack to be successful.</p></div>
<div><p style="text-align:left;">&nbsp;</p></div><div><p style="text-align:left;"><b>Prevention</b>: If a user finds themselves in the middle of an MFA Prompt Bombing attack, it is likely that the hacker already knows the user’s password – if they didn’t have the correct password, they wouldn’t progress to the MFA screen. Rather than just denying the login attempt over and over again, hoping it will stop, try logging into that account and changing the password. Ideally, that would stop the prompt bombing because the hacker would no longer have the correct password.</p></div>
<div><p style="text-align:left;">&nbsp;</p></div><div><blockquote style="margin-left:40px;border:none;"><div><p style="text-align:left;"><b><span style="font-size:18px;">3.&nbsp;Service Desk Attacks</span></b></p></div>
</blockquote></div><div><p style="text-align:left;">Hackers have learned they can bypass MFA by making phone calls to a help desk phone number, pretending to be a user who has forgotten their password. If the service representative on the phone does not enforce the proper verification procedures, they may grant access to hackers.</p></div>
</blockquote><div><div><p></p><blockquote style="margin-left:40px;border:none;"><p></p></blockquote></div>
</div><div><blockquote style="margin-left:40px;border:none;"><span style="font-size:18px;"><p></p></span></blockquote><p></p></div>
<div><p></p><blockquote style="margin-left:40px;border:none;"><p></p></blockquote></div>
<div><blockquote style="margin-left:40px;border:none;"><p></p></blockquote><p></p></div>
<div><p></p><blockquote style="margin-left:40px;border:none;"><p></p></blockquote></div>
<div><blockquote style="margin-left:40px;border:none;"><p></p></blockquote><p></p><p style="text-align:left;"></p><p></p><p></p></div>
<div><p style="text-align:left;">&nbsp;</p></div><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><div><p style="text-align:left;"><b>Example:</b>&nbsp;The hackers behind the recent MGM Resorts attack used this method, calling to reset a password. The representative unknowingly gave the hackers access to their network, where they were able to upload malware to launch a ransomware attack.</p></div>
</blockquote><div><p style="text-align:left;">&nbsp;</p><p style="text-align:justify;">It is abundantly clear that users MUST continue to pay attention to their security, even with all of their security measures in place. There are several ways for hackers to bypass security measures, so staying vigilant is key (and doesn’t take too much effort). Avoid clicking the links in emails, especially links to login accounts. If for some reason you do click the link in the email, pay attention to the URL – is it the real website? Additionally, password security is still important, even will all the additional security procedures in place. Make the effort to regularly change your passwords and when you do change them, make them unique for each account, with a mix of upper- and lower-case letters, numbers, and special characters. Implementing a strong, unique password for each account makes guessing passwords more difficult for hackers and spammers.</p><p style="text-align:right;"><span style="font-size:8px;">-Emily Comora</span></p></div>
<p></p></div></div><div data-element-id="elm_QiREneI2LnR4QZQyXE75WA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span style="font-size:10px;">The Hacker News (2024, Feb 24) 4 Ways Hackers use Social Engineering to Bypass MFA.&nbsp;<i>The Hacker News.&nbsp;</i>Retrieved from&nbsp;</span><span style="font-size:10px;">https: //thehackernews</span><span style="font-size:10px;">. com/ 2024/ 02/4-ways-hackers-use -social-engineering.html</span></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 30 Apr 2025 14:28:00 -0400</pubDate></item></channel></rss>