Microsoft says that users who enable multi-factor authentication (MFA) for their accounts will end up blocking 99.9% of automated attacks.
The recommendation stands not only for Microsoft accounts but also for any other profile, on any other website or online service.
If the service provider supports multi-factor authentication, Microsoft recommends using it, regardless if it’s something as simple as SMS-based one-time passwords, or advanced biometrics solutions.
“Based on our studies, your account is more than 99.9% less likely to be compromised if you use MFA,” said Alex Weinert, Group Program Manager for Identity Security and Protection at Microsoft.
Passwords don’t matter anymore
Weinert said that old advice like “never use a password that has ever been seen in a breach” or “use really long passwords” doesn’t really help.
He should know. Weinert was one of the Microsoft engineers who worked to ban passwords that became part of public breach lists from Microsoft’s Account and Azure AD systems back in 2016. As a result of his work, Microsoft users who were using or tried to use a password that was leaked in a previous data breach were told to change their credentials.
But Weinert said that despite blocking leaked credentials or simplistic passwords, hackers continued to compromise Microsoft accounts in the following years.
He attributed this to the fact that passwords or their complexity don’t really matter anymore. Nowadays, hackers have different methods at their disposal to get their hands on users’ credentials, and in most cases, the password doesn’t matter.
Also known as . . .
User assists attacker by . . .
Does your password matter?
Breach replay, list cleaning
Very high – 20+M accounts probed daily in MSFT ID systems
Very easy: Purchase creds gathered from breached sites with bad data at rest policies, test for matches on other systems. List cleaning tools are readily available.
Being human. Passwords are hard to think up. 62% of users admit reuse.
No – attacker has exact password.
Man-in-the-middle, credential interception
Very high. 0.5% of all inbound mails.
Easy: Send emails that promise entertainment or threaten, and link user to doppelganger site for sign-in. Capture creds. Use Modlishka or similar tools to make this very easy.
Being human. People are curious or worried and ignore warning signs.
No – user gives the password to the attacker
Medium: Malware records and transmits usernames and passwords entered, but usually everything else too, so attackers have to parse things.
Clicking links, running as administrator, not scanning for malware.
No – malware intercepts exactly what is typed.
Dumpster diving, physical recon, network scanning.
Difficult: Search user’s office or journal for written passwords. Scan network for open shares. Scan for creds in code or maintenance scripts.
Writing passwords down (driven by complexity or lack of SSO); using passwords for non-attended accounts
No – exact password discovered.
Blackmail, Insider threat
Very low. Cool in movies though.
Difficult: Threaten to harm or embarrass human account holder if credentials aren’t provided.
No – exact password disclosed
Guessing, hammering, low-and-slow
Very high – accounts for at least 16% of attacks. Sometimes 100s of thousands broken per day. Millions probed daily.
Trivial: Use easily acquired user lists, attempt the same password over a very large number of usernames. Regulate speed and distributed across many IPs to avoid detection. Tools are readily and cheaply available. See below.
Using common passwords such as qwerty123 or Summer2018!
No, unless it is in the handful of top passwords attackers are trying.
Database extraction, cracking
Varies: Penetrate network to extract files. Can be easy if target organization is weakly defended (e.g. password only admin accounts), more difficult if appropriate defenses of database, including physical and operation security, are in place. Perform hash cracking on password. Difficulty varies with encryption used. See below.
No, unless you are using an unusable password (and therefore, a password manager) or a really creative passphrase. See below.
With over 300 million fraudulent sign-in attempts targeting Microsoft cloud services every day, Weinert says that enabling a multi-factor authentication solutions blocks 99.9% of these unauthorized login attempts, even if hackers have a copy of a user’s current password.
The 0.1% number accounts for more sophisticated attacks that use technical solutions for capturing MFA tokens, but these attacks are still very rare when compared to the daily hum of credential stuffing botnets.
Google said the same thing in May
Microsoft’s boast that using MFA blocks 99.9% of automated account takeover (ATO) attacks isn’t the first of its kind.
Back in May, Google said that users who added a recovery phone number to their accounts (and indirectly enabled SMS-based MFA) were also improving their account security.
“Our research shows that simply adding a recovery phone number to your Google Account can block up to 100% of automated bots, 99% of bulk phishing attacks, and 66% of targeted attacks that occurred during our investigation,” Google said at the time.
When both Google and Microsoft are recommending the same thing, it’s probably a good time to start following their advice.
This article was written by Catalin Cimpanu and originally appeared in ZDNet.