Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Identity & Access

Microsoft MFA Bypassed via AuthQuake Attack 

Oasis Security has disclosed AuthQuake, a method for bypassing Microsoft MFA within an hour without user interaction.

AuthQuake Microsoft MFA bypass

Non-human identity management firm Oasis Security has disclosed the details of an attack that allowed its researchers to bypass Microsoft’s multi-factor authentication (MFA) implementation.

The attack method, dubbed AuthQuake, was reported to Microsoft in late June and a temporary fix was rolled out a few days later. The tech giant released a permanent fix in October. 

According to Oasis, the vulnerability, which is described as critical, could have allowed threat actors to bypass Microsoft’s MFA and gain access to accounts — provided that they had the target’s username and password.

The security firm noted that the MFA bypass could have been exploited to access Outlook emails, OneDrive files, Teams chats, and Azure cloud instances, and highlighted the potential impact by pointing out that Microsoft recently reported having more than 400 million paid Office 365 seats. 

Oasis said the AuthQuake bypass method was dangerous because it only took (on average) an hour to execute, it required no user interaction, and it would not trigger any notification to the victim.

When using an authenticator app to obtain the six-digit code needed for MFA during a login attempt, one session supports up to 10 failed attempts, to prevent brute-force attacks. 

However, Oasis researchers discovered that an attacker could execute multiple attempts simultaneously, enabling them to go through possible combinations relatively fast. 

In tests conducted by the researchers, they found that each MFA code generated by the app is valid for roughly three minutes, which meant a 3% chance for the attacker to guess the correct code. After the three minutes were up, the attacker could initiate another session, and the process would be repeated until a correct code was guessed — and the victim would not see any signs of an attack attempt during this time. 

Advertisement. Scroll to continue reading.

The tests showed that the chances of guessing the correct code after 24 sessions (which took roughly 70 minutes) exceeded 50%, and in some cases the code was guessed quickly, as demonstrated in a video showing the exploit in action. 

Regarding Microsoft’s fix, Oasis noted, “While specific details of the changes are confidential, we can confirm that Microsoft introduced a much stricter rate limit that kicks in after a number of failed attempts, and the strict limit lasts around half a day.”

Related: Google Cloud Rolling Out Mandatory MFA for All Users

Related: MFA Isn’t Failing, But It’s Not Succeeding: Why a Trusted Security Tool Still Falls Short

Related: Microsoft Announces Mandatory MFA for Azure

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Discover strategies for vendor selection, integration to minimize redundancies, and maximizing ROI from your cybersecurity investments. Gain actionable insights to ensure your stack is ready for tomorrow’s challenges.

Register

Dive into critical topics such as incident response, threat intelligence, and attack surface management. Learn how to align cyber resilience plans with business objectives to reduce potential impacts and secure your organization in an ever-evolving threat landscape.

Register

People on the Move

Karl Triebes has joined Ivanti as Chief Product Officer.

Steven Hernandez has joined USAID as CISO and Deputy CIO.

Data security and privacy firm Protegrity has named Michael Howard as its CEO.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.