With enhanced cybersecurity, cyber criminals are looking for new ways to circumvent data protections. One data protection the university utilizes is multi-factor authentication (MFA). A new trend in cyberattacks to get around MFA is SIM-swapping.
SIM-Swapping is when a cyber criminal maliciously tricks a mobile company into transferring a subscriber identity module (SIM) card from one user's cell phone profile to their own device in order to gain access to their data and activities.
SIM-Swapping is a threat because not only does it give a malicious actors access to a user's phone and cell phone activity, but security codes required for MFA are often sent via text and cybercriminals with fraudulent SIM cards can approve or complete account verification steps. They can use this fraudulent verification to access sensitive personal data, and/or to infiltrate company networks and access confidential business data.
To help protect your and the university's data, it's important to understand how SIM-swapping cyberattacks occur.
In some cases, the targeted individual or organization can identify the SIM-swapping attack and take precautions to protect their data by reporting the incident to the mobile company and IT security.
To report an IT security incident at the university, please contact the OIT Service Desk.
One way to protect against cyber vulnerabilities is to utilize and install multi-factor authentication (MFA). Duo is the university used multi-factor authentication IT security app that requires you to confirm you are the one logging in to a secure access point. The Duo app on smart phones provides additional information about the location the login request is coming from which is very helpful in being certain that it is YOU authenticating. More information about installing Duo on your mobile device is available on the OIT website.
Multi-factor authentication (MFA) phishing is when a malicious actor attempts to gain access to a secure account and sends a false MFA request to a user.
MFA phishing is one method malicious actors use to bypass IT security measures to gain access to secure data and information.
Multi-factor authentication is intended to prevent cybercriminals from using any compromised credentials and passwords, but with MFA phishing they are able to overcome this security protection.
Malicious actors will attempt to use compromised credentials and login to a secure access point. This will generate a MFA request to the compromised user. If a user is not paying attention to the MFA request details, they may approve the request and allow the malicious actor access.
By remaining vigilant and checking all MFA requests that come through, you can spot an MFA phishing attempt and decline it.
It is best practice when using Duo for accessing university resources to read through the pop-up message and verify your details before approving the login attempt. Don’t approve, unless it’s you.
Remember, you can help mitigate cyber vulnerabilities by keeping the following in mind:
If you think your credentials may be compromised or you receive a suspicious Duo notification, decline the request and report the incident to the OIT Service Desk.
303-724-4357 (4-HELP)
7:30 a.m. - 6 p.m., M - Th
7:30 a.m. - 5 p.m., Fri
Submit a ticket
Email the Service Desk
24/7 access to the Service Center