Cybersecurity

<strong>5 Ways to Protect Your Devices against Push-Bombing</strong>

Zachary Kitchen

In the contemporary digital world, where the world is changing by the second, businesses are looking to adopt novel ways to protect their vital data and themselves from hackers and the like. Adopting multi-factor authentication at the time was seen as a plus by businesses until push-bombing became an issue.

Right now, it has become a concern and is looking like the next major thing for businesses to hold meetings over. From C-level employees down to departmental and IT staff, everyone is getting increasingly worried about the daily increasing threats and risks that are coming up with this new type of attack.

To show how serious this issue is, Microsoft reports that MFA push-bombing attempts rose by nearly 80% in less than a year – between December 2021 and August 2022. Many hackers are taking advantage of human error for this, and companies are suffering.

So, how do we tackle push-bombing? Before answering this question, let’s define push-bombing.

What Is Push-Bombing?

Push-bombing is a common occurrence by hackers aimed at businesses and companies that use MFA to safeguard their data. MFA refers to the secure login process that aims at confirming the identity of the actor behind the login by using two or more devices to verify the “check.” This is just one of the numerous ways to verify user identity and is highly preferred given its simple process and UX benefits, of course.

Push-bombing is an approach by hackers where the malicious actor utilizes a bot or script to trigger several login attempts with illegally-procured login details and uses it to start a chain of multiple notifications to the user’s personal device repeatedly.

Below is a more explicit description:

  • An attacker sends several push notifications to a user to force them to approve the login attempt accidentally.
  • Understandably, a user will be hard-pressed to do so. With the number of messages and notifications sent, there will surely be an acceptance, whether out of frustration or accidentally, while using the device.
  • Immediately after the user accepts one of the login attempts, the hacker logs in successfully, usually adds a device of their own, and proceeds to undertake malicious deeds and actions.

It is also common for such fraudulent attackers to come up with a narrative of being an IT admin from the same company which the innocent user works for, in a bid to persuade them to accept their login attempt.

What to Do to Protect Your Devices against Push-Bombing

In cybersecurity, the best way to repel an attack is to offer a lot of resistance in quantity and quality. Here are some ways to keep your devices safe from push-bombing:

  1. Passwordless MFA

Fully passwordless MFA policies that meet FIDO standards fit the definition of phishing resistance approved by CISA. While some solution providers offer some level of FIDO authentication and use vulnerable approaches for contingencies as hackers do not waste time trying to take advantage. However, systems like these cannot be termed fully passwordless MFA.

Fully passwordless MFA that employ QR code scanning, for example, provide the most resilient protection against push-bombing. This is because the attack vector (passwords) is eliminated.

  1. The use of password vaults

If your company is in the business of login details comprising usernames and passwords, ensure your employees use password vaults and managers. A better option is a full Privileged Authentication Management solution (PAM) for highly secure and sensitive logins. There should be constant reviews and checks of this process, and you can get an external managed IT professional to take a look too.

  1. Password resets

If you suspect any credentials have been compromised, engage a password reset. This will help you avoid push-bombing in the future. While arbitrary password changing is not the best thing to do, forcing a password change or reset is an excellent way to limit how much time compromised credentials will be used during push-bombing.

  1. Constant review of MFA configuration

It is essential to constantly review company MFA configurations. This is to check if basic access patterns are still as secure and sensible as possible. It is not uncommon to reconfigure the best MFA solutions as it will reduce access with limited verification.

  1. Apply smart password best practices

You should also apply smart password best practices. Do not allow your staff to use the same login details for several services except when it is of the utmost importance. Hence, if a compromise occurs, the potential push-bombing attack surface is reduced.

Digital Crisis Can Help Protect Your Business Against Push-Bombing and Other MFA Fatigue Attacks!

If you are looking to increase your business’s cybersecurity levels, especially against push-bombing, then Digital Crisis is here for you. We provide managed IT services, top-notch IT cybersecurity, and 24/7 IT support. Contact us if you need any of these services.

Zachary Kitchen

Get Your Free Cybersecurity Guide

Protect your business with expert tips. Fill out the form to download our comprehensive guide and enhance your cybersecurity.

This field is for validation purposes and should be left unchanged.

By downloading you’re confirming that you agree with our Terms and Conditions.

What business owners are saying about us...

Read testimonials from satisfied clients who trust Digital Crisis for their IT needs. Discover how we’ve helped businesses like yours.

Quote icon

We Make Money FASTER Because of Digital Crisis

In 2010, my business had an old DOS-based server from 1995 that ran our proprietary software, which crashed. If it weren’t for Zach, we’d have to start completely over! Not only was Digital Crisis able to restore all our data, but they were also able to migrate us to a modern system which allowed us to get paid faster and work remotely.
Sandra Van der Vorm
Owner, Vansteen Marine Supply
Quote icon

I Never Lost a Day of Work During the Pandemic

Zach truly understands my firm’s needs and always provides valuable tips and tools to make my firm run more efficiently. For example, when the COVID pandemic hit in 2020, I didn’t lose a single day of work since Digital Crisis had me set up on their cloud system, and I could remote in from anywhere.
Pamela Stewart
Owner, Law Office of Pamela Stewart
Quote icon

My Firm’s Efficiency DOUBLED Overnight

I thought my firm was doing just fine with my previous IT setup- boy, was I wrong! Digital Crisis came in Updated Equipment and Technology. I wish I had used them ten years earlier when I first met Zach. You will be sold immediately by their knowledge, patience, and willingness to help.
Craig Ribbeck
Senior Partner, Ribbeck Law Firm
Quote icon

They’re a Valuable Member of Our Team

Zach is great at explaining to us about our IT in plain-speak, rather than “geek-speak.” I genuinely feel like hiring Digital Crisis was the best decision I’ve made for my firms. If you want an IT expert who charges reasonable rates and is not just an IT guy, but a valuable member of your team, call Zach.
Keith Morris
Senior Partner, Texas Probate Attorney
Quote icon

My Firm Runs Like a Well-Oiled Machine

I’ve worked with Zach for over 15 years. Digital Crisis takes their time to understand my practice and doesn’t try to shove a cookie-cutter system down our throat. When Digital Crisis first came in, they took the time to understand our firm and helped streamline and modernize our processes.
Kelly Forester
Senior Partner, Matthews Forester Law Firm
Quote icon

Digital Crisis Saves Us Thousands Every Year

We used to enter data quarterly that would easily take an average of two weeks each quarter to enter. Then, when Digital Crisis came in, they fully automated our process, taking minutes instead of weeks to process the same data, not only faster but more accurately, removing room for human error. The new system gets things done faster and saves us thousands every year in labor alone!
Sandy Hickey
Executive Assistant, PAS Online
Quote icon

They Rescued My Practice

On a Friday, my practice had to be moved immediately without any notice. Digital Crisis not only managed to come out and get our IT up and running, but they had our phones and internet up and running by Monday morning, and we didn’t lose a single day of business!  I can’t recommend Zach and his team enough.
Marietta Cline, MD
Owner, Cline Pediatrics

Protect Your Network Against Cyber Threats

Contact Digital Crisis for a network security consultation and ensure your business is safeguarded against cyber threats.