Skip to content

T1111 Multi-Factor Authentication Interception

Adversaries may target multi-factor authentication (MFA) mechanisms, (i.e., smart cards, token generators, etc.) to gain access to credentials that can be used to access systems, services, and network resources. Use of MFA is recommended and provides a higher level of security than usernames and passwords alone, but organizations should be aware of techniques that could be used to intercept and bypass these security mechanisms.

If a smart card is used for multi-factor authentication, then a keylogger will need to be used to obtain the password associated with a smart card during normal use. With both an inserted card and access to the smart card password, an adversary can connect to a network resource using the infected system to proxy the authentication with the inserted hardware token. 2

Adversaries may also employ a keylogger to similarly target other hardware tokens, such as RSA SecurID. Capturing token input (including a user’s personal identification code) may provide temporary access (i.e. replay the one-time passcode until the next value rollover) as well as possibly enabling adversaries to reliably predict future authentication values (given access to both the algorithm and any seed values used to generate appended temporary codes). 1

Other methods of MFA may be intercepted and used by an adversary to authenticate. It is common for one-time codes to be sent via out-of-band communications (email, SMS). If the device and/or service is not secured, then it may be vulnerable to interception. Service providers can also be targeted: for example, an adversary may compromise an SMS messaging service in order to steal MFA codes sent to users’ phones.3

Item Value
ID T1111
Sub-techniques
Tactics TA0006
Platforms Linux, Windows, macOS
Version 2.1
Created 31 May 2017
Last Modified 14 April 2023

Procedure Examples

ID Name Description
G0114 Chimera Chimera has registered alternate phone numbers for compromised users to intercept 2FA codes sent via SMS.5
G0094 Kimsuky Kimsuky has used a proprietary tool to intercept one time passwords required for two-factor authentication.6
G1004 LAPSUS$ LAPSUS$ has replayed stolen session token and passwords to trigger simple-approval MFA prompts in hope of the legitimate user will grant necessary approval.7
C0014 Operation Wocao During Operation Wocao, threat actors used a custom collection method to intercept two-factor authentication soft tokens.8
S0018 Sykipot Sykipot is known to contain functionality that enables targeting of smart card technologies to proxy authentication for connections to restricted network resources using detected hardware tokens.4

Mitigations

ID Mitigation Description
M1017 User Training Remove smart cards when not in use.

Detection

ID Data Source Data Component
DS0027 Driver Driver Load
DS0009 Process OS API Execution
DS0024 Windows Registry Windows Registry Key Modification

References