MFA? We don’t need no stinking MFA!

Share This Post

Summary: The FBI and CISA are warning that Russian APTs have been, as early as May 2021, and are using brute force attempts to gain access to old Active Directory accounts that have been un-enrolled from Duo MFA due to a long period of inactivity thus allowing them to register a new MFA device. Once access is granted, they’re leveraging PrintNightmare (CVE-2021-34527) to obtain administrative credentials. They then modify the domain controller’s local hosts file to redirect traffic to the loopback address (127.0.0.1) rather than the Duo server. By preventing communication with the MFA server, Duo fails open by default and effectively bypasses MFA for all domain accounts. Failing open by default is not exclusive to Duo and could be the case with any other MFA implementation.

What can you do? Read through the Joint Cyber Security Advisory AA22-074A. It’s packed with best practices and mitigation recommendations and will be worth the effort. https://www.cisa.gov/uscert/ncas/alerts/aa22-074a



Reach out to our incident response team for help

More To Explore

Information Security News – 4/14/2025

Oracle Confirms “Obsolete Servers” Hacked Article link: https://www.bleepingcomputer.com/news/security/oracle-says-obsolete-servers-hacked-denies-cloud-breach/    Phishing Kits Now Vet Victims in Real-Time Before Stealing Credentials Article link: https://www.bleepingcomputer.com/news/security/phishing-kits-now-vet-victims-in-real-time-before-stealing-credentials/    Neptune RAT

Information Security News – 4/7/2025

Criminal Group Claims Responsibility for Cyberattack on Minnesota Casino Article Link: https://cdcgaming.com/brief/cybersecurity-incident-at-minnesota-tribal-community-casino-prompts-shutdown/ As CISA Downsizes, Where Can Enterprises Get Support? Article Link: https://www.darkreading.com/cybersecurity-operations/roundtable-cisa-downsizes-where-can-enterprises-look-support Oracle Privately

Do You Want to Shore Up Your Defenses?

We're opening our first round of threat hunting engagements to 100 organizations. Sign up or join the wait list here.