{"id":15418,"date":"2023-06-30T12:00:00","date_gmt":"2023-06-30T12:00:00","guid":{"rendered":"https:\/\/integritech.io\/?p=15418"},"modified":"2023-05-03T15:45:59","modified_gmt":"2023-05-03T15:45:59","slug":"what-is-push-bombing-how-can-you-prevent-it","status":"publish","type":"post","link":"https:\/\/integritech.io\/what-is-push-bombing-how-can-you-prevent-it\/","title":{"rendered":"What Is Push-Bombing & How Can You Prevent It?"},"content":{"rendered":"

Cloud account takeover has become a major problem for organizations. Think about how much work your company does that requires a username and password. Employees end up having to log into many different systems or cloud apps.<\/p>

Hackers use various methods to get those login credentials. The goal is to gain access to business data as a user. As well as launch sophisticated attacks, and send insider phishing emails.<\/p>

How bad has the problem of account breaches become? Between 2019 and 2021, account takeover (ATO) rose by 307%.<\/a><\/p>

Doesn\u2019t Multi-Factor Authentication Stop Credential Breaches?<\/h3>

Many organizations and individuals use multi-factor authentication (MFA). It’s a way to stop attackers that have gained access to their usernames and passwords. MFA is very effective at protecting cloud accounts and has been for many years.<\/p>

But it\u2019s that effectiveness that has spurred workarounds by hackers. One of these nefarious ways to get around MFA is push-bombing.<\/p>

How Does Push-Bombing Work?<\/h2>

When a user enables MFA on an account, they typically receive a code or authorization prompt of some type. The user enters their login credentials. Then the system sends an authorization request to the user to complete their login.<\/p>

The MFA code or approval request will usually come through some type of \u201cpush\u201d message. Users can receive it in a few ways:<\/p>