Glasgow Business IT Support

Ayrshire IT Support for Business

Lanarkshire IT Services

Here’s how cyber criminals try to hack your accounts while you sleep using fatigue cyber attacks

Have you ever received a notification on your phone while you’re sleeping, asking if it’s really you logging into an account?these are fatigue attacks. It’s too easy to fall for…

Fatigue attacks are on the rise

Many organisations are being hit with Fatugue attacks. 

using well known social engineering techniques to gain access to businesses networks and bypass there cybersecurity using the simple method of user tiredness. 

Here’s how cyber criminals try to hack your accounts while you sleep

Picture this… you’re fast asleep after a hectic day at work, when suddenly your phone starts buzzing.

It’s multiple notifications from different apps checking it’s really you trying to log in.

You’re half asleep and confused with all these Multi Factor Authentication requests. So you hit YES – and they stop.

You go back to sleep… but… you’ve just let cyber criminals into your account.

This is called a ‘fatigue attack’. And they’re becoming more common.

Good news – Microsoft Authenticator has a plan to protect you from your sleepy self.

It’s called ‘number matching’ and it’s simple. When you get a login notification, you have to type in a number displayed on your app.

Yes it’s a little extra work. But it forces you to think about the login notification, not just hit a button. And that keeps you safer.

Whether you already use Microsoft Authenticator or not, we can help get you set up.

An MFA fatigue attack is a type of cyberattack that exploits the weaknesses of multi-factor authentication (MFA) systems. It is used to gain unauthorized access to an online account or service by repeatedly attempting to authenticate with different combinations of credentials. The attacker will use a variety of techniques, such as phishing, brute force attacks, and credential stuffing, in order to gain access. This type of attack can be difficult for organizations to detect and prevent due to its sophisticated nature. However, organizations can take steps such as using strong passwords and implementing two-factor authentication in order to protect against MFA fatigue attacks..

 This type of attack is also known as an MFA bypass, brute force attack, credential stuffing, prompt bombing, or a push harassment attack

Like all attacks the most effective ways to help reduce risk is MFA, strong passwords, and staff cyber security and awareness training.


More Posts

Looking for Business IT Support in Glasgow?

Contact us today. We’ve got plenty of ideas to make your business more efficient.