Ilias el Kasmi

0 %
Ilias el Kasmi
Cyber Security Engineer
Windows Security Specialist
  • Residence:
    Netherlands
  • City:
    Amsterdam
  • Age:
    27
Languages
Dutch
English
Amazigh
Skills
Microsoft 365 (Defender Suite)
Azure
Windows (Server)
BurpSuite
Linux
MacOS
ELK Stack
Certificates
  • ISO/IEC 270001
  • SC-900: Microsoft Security, Compliance, and Identity Fundamentals
Trainings
  • Windows and Active Directory Security
  • Defend Against Modern Targeted Attacks
  • TRANSITS II
  • TRANSITS I
  • Jira Essentials
  • Confluence Server
  • Splunk 7.x Fundamentals Part 1
  • Brunel Big Data Experience

Azure MFA Fraud Protection

13/05/2023

Even when Multi-Factor Authentication (MFA) is active, there’s still a risk of password compromise by malicious actors. This could occur, for instance, following a successful phishing campaign or if they gain access to a database of compromised accounts. Unknown MFA approval requests received by users could be the work of such actors who have accessed their passwords.

So, what can be done to counteract this? Today, I’m excited to share a feature I recently implemented on my Microsoft Azure Active Directory tenant: the Multi-Factor Authentication Fraud Alert. This feature adds an extra layer of security, enhancing user protection against unauthorized access and helping track fraudulent attempts.

What benefits does it bring? It empowers users to report unauthorized MFA notifications to the administrators. When a user flags an MFA prompt as suspicious, this event becomes visible in various reports, such as the sign-ins report, audit logs, and the risk detection report.

Here’s how it works: Imagine a cybercriminal manages to steal your password and attempts to log in to your account. With MFA activated, the criminal would encounter a second authentication request, like a prompt to enter the code displayed on your phone screen. If you see an authentication prompt on your phone when you’re not trying to log in, the Fraud Alert feature allows you to initiate a fraud alert. First, the user would indicate that the authentication request wasn’t initiated by them, and then they can report the prompt to the administrators.

Screenshot of a fraudulent MFA authentication attempt in Azure
Example of a fraudulent authentication attempt

This function is available provided that your tenant includes a Premium license. You can find it by searching for the Multi-Factor Authentication section under your tenant. Within this section, look for Fraud Alert and click on it. You’ll see three options:

  • Allow users to submit fraud alerts: this activates the feature I’ve described.
  • Automatically block users who report fraud: this will automatically block users who send a fraud alert.
  • Code to report fraud during initial greeting: a numerical sequence you can use to report an authenticated prompt.
Azure MFA Fraud Alert settings interface
Fraud alert settings

Administrators can also be notified upon fraud detection. You can set this up by navigating to Multi-Factor Authentication and then clicking on Notifications. Enter the email address where you’d like to receive reported prompts.

Azure Active Directory notification settings screen
Notification setting in Azure AD

When an alert is made, the specified email will automatically receive a message from azure-noreply@microsoft.com with the subject line “Multi-Factor Authentication Fraud Alert”. The body of the email will specify the user involved, enabling the administrator to begin an investigation.

Sample email notification of an Azure MFA Fraud Alert
Example of a fraud alert email

I hope you found this blog post both interesting and helpful.


For more information, please consult the following resources:

Posted in Microsoft 365Tags:
© 2023 All Rights Reserved.