18 New Mobile MFA Bypass Exploits

|

Researchers have discovered at least 18 vulnerabilities affecting Exynos modems used in multiple versions of Samsung, Pixel and Google smartphones. These flaws can be exploited to gain access to personal and confidential data on the mobile device, but also to use the access to steal MFA codes to gain privileged access to applications.

These vulnerabilities empower hackers to covertly gain access to these smartphones. 4 out of 18 of the security flaws allow hackers to compromise the phone remotely using just the victim’s phone number.

It’s important to note that attackers would need some privileged access to a mobile network operator or local access to the device to exploit them. Previous reports show that plants or recruited bad actors withinb Service Providers have been assisting malicious threat actors in installing malware on victim devices for some time now.

These critical exploits are covered in CVE-2023-24033.

Acreto Ecosystem security is technology for any IP based assets, including mobile phones and tablets. This includes access control, isolation and full inline threat prevention.

Moreover, Acreto delivers uniform and consistent security for all of an organization’s technologies regardless of the type of technology, location, connected network or ownership.

This includes:

Access Technologies

Organization or BYOD Devices
– Computers
Windows, Mac, Linux

– Mobile Phones & Tablets
Android & IOS

– Internet-of-Things (IoT)
Building control systems, ATMs, Sensors, etc…

– Internet-of-Medical Devices (IoMD)
Imaging Systems, Patient Monitors, Ventilators, etc…

Offices
– Headquarters
– Branch Offices
– Small Offices
– Home Offices

Third-Party
– Customer or Vendor Offices
– Customer or Vendor Remote Users
– Customer or Vendor IoTs and Sensors

Application Delivery Technologies

Data Centers
– Networks
– Servers
– Virtual Machines (VM)
– Kubernetes / Containers

Clouds
– Virtual Private Clouds (VPC)
– Cloud Instances
– Kubernetes / Containers

SaaS Applications
Office 365, Salesforces, Workday, etc…

About Acreto

Acreto delivers full-stack cybersecurity without products, logistics or significant security expertise. It creates and consolidates the best of cybersecurity into a single plug-and-play platform with automated updates to stay ahead of threats. Acreto activates enterprise-grade security instantly, so organizations can run safely, easily, and without interruption.

About The Author: Acreto Threat Labs

Interested in seeing Acreto SASE+Plus in action? Let’s start with some basic information.




    Interested in seeing Acreto SASE+Plus in action? Let’s start with some basic information.




      Interested in seeing Acreto SASE+Plus in action? Let’s start with some basic information.




        Interested in seeing Acreto SASE+Plus in action? Let’s start with some basic information.