$10 and a stolen cookie, a recipe for bypassing your MFA and SSO
The techniques, tactics and procedures used by nefarious characters to bypass security controls continue to evolve at a rapid pace. A technique that has proven to be effective in greasing the tracks in gaining the initial foothold is the theft of web session cookies.
Like updating passwords on a regular basis, clearing web browser cookies is a cyber hygiene practice neglected by most. If hijacked, these cookies will enable attackers with the necessary login details to bypass Multi-Factor Authentication (MFA), Single Sign-on (SSO) and gain access to critical business applications such as Jira or Slack. Threat actors can use this technique as a jumping point to deploy malicious code, social engineer and further carry out their attack.
Watch this webinar to learn how cookies and session IDs can be stolen with ease and how CyberArk Endpoint Privilege Manager (EPM) threat protection can prevent this and many other emerging techniques from being used in the wild.
Attendees of this webinar will walk away with:
Knowledge of various cookie theft tactics
An example of how gaming company EA was breached when attackers bought stolen cookies on the dark web
How CyberArk EPM threat prevention policies prevent cookie theft on your endpoints and product demo