“Cybercriminals are more and more logging in moderately than hacking into networks via legitimate accounts.”— IBM Safety X-Power Menace Index 2024
“Using stolen credentials stays the first manner into organizations, with 40% of breaches involving credentials as the highest ‘motion’ to entry taken.”— Verizon 2024 Information Breach Investigations Report
In common creativeness, hackers navigate advanced code exploits. In actuality, most cellular breaches stem from compromised or stolen credentials. Some happen through customers divulging credentials in phishing assaults, reusing passwords from different compromised accounts (making it straightforward for hackers to guess) or via brute-force password guessing. Even biometrics have turn into much less safe as hackers use AI voice cloning know-how to log into financial institution accounts the place voice can be utilized for verification.

Multi-Issue Authentication (MFA) guards towards stolen credentials by requiring customers to mix a number of types of verification. This ensures that even when one login technique is compromised, the account and its information stay safe. If a risk actor makes an attempt to make use of stolen credentials throughout an assault, MFA not solely blocks unauthorized entry but additionally alerts the group to suspicious or fraudulent login makes an attempt, particularly when identification monitoring options are in place.
Due to its effectiveness, MFA reduces the danger of account compromise by 99%, in response to the U.S. Cybersecurity & Infrastructure Safety Company (CISA).
MFA Weaknesses
Whereas MFA is extremely efficient, not all MFA options supply the identical stage of safety. The standard of MFA implementation varies enormously. NowSecure cellular software safety testing of 1000’s of apps throughout totally different marketplaces reveals that solely half of cellular apps with MFA use a safe implementation, and fewer than 1% routinely take a look at their MFA safety.
Attackers have developed new strategies in recent times to bypass legacy MFA strategies, starting from easy MFA fatigue assaults to intercepting one-time passcodes (OTPs).To remain forward of those evolving threats, organizations should do extra than simply implement trendy MFA — they need to implement it. Confirmed and extensively supported passwordless approaches, based mostly on the FIDO2 specs, present stronger safety than passwords and SMS OTPs whereas providing an easier consumer expertise and simpler deployment for service suppliers.
“Whereas MFA is extremely efficient, not all MFA options supply the identical stage of safety.”
Is Your MFA Sturdy Sufficient to Safeguard Delicate Information?
The extra transactions your cellular app processes or the extra delicate information it handles, the extra seemingly it’ll appeal to focused, refined assaults from risk actors.
This is the reason NowSecure advocates for progressive testing utilizing a tiered threat mannequin. Not all apps require the identical stage of safety funding. Apps that deal with vital features or delicate information demand larger time and assets to make sure they can’t be exploited or misused by malicious actors.
Primarily based on the danger offered by every app, progressive testing offers totally different ranges of depth and protection in order to speculate the correct amount of assets, from least threat to most threat:
- Automated cellular software safety testing covers vital take a look at instances for MFA, although our findings might not increase a crimson flag and scream it’s an MFA discovering. Apps that don’t comprise delicate data or can’t conduct monetary transactions can normally get away with automated testing flagging the most typical vulnerabilities.
- Guide or NowSecure Cellular Pen Testing as a Service (PTaaS) is the one strategy to actually take a look at if MFA is correctly carried out. With NowSecure Platform Guided Testing, we will cowl extra take a look at instances because of the flexibility of a human to govern.
- And eventually, for a strong adversarial emulation, expert-led pen testing can spherical out take a look at protection with the extra offensive actions. That is the proper stage of testing for apps which have the capabilities to conduct monetary transactions or comprise delicate well being data, for instance.
How NowSecure Assessments MFA Safety
Testing for MFA efficacy in cellular apps entails a number of key steps to confirm correct implementation and safety. It’s essential to acknowledge that whereas automated safety checks can detect widespread assault vectors, malicious actors repeatedly adapt their techniques and probe for weaknesses. Securing essentially the most delicate property in cellular apps calls for the experience and hands-on evaluation of skilled pen testers.
1. Evaluation Implementation Design: Analyze the MFA integration to make sure it aligns with safety finest practices and requirements like NIST and OWASP Cellular Software Safety Verification Commonplace (MASVS). This consists of checking whether or not a number of authentication components (e.g., one thing you understand, one thing you’ve got, one thing you might be) are successfully mixed and appropriately separated.
2. Look at Consumer Expertise Flows: Make sure that the MFA course of doesn’t have bypassable steps or weak fallbacks, equivalent to reverting to single-factor authentication). Take a look at totally different eventualities, like app upgrades, offline entry and restoration strategies to establish any potential weak factors.
3. Take a look at Authentication Channels: Validate the safety of communication channels used for MFA, equivalent to SMS, e-mail, push notifications and authenticator apps. Make sure that these channels are encrypted and that haven’t any vulnerabilities (e.g., SIM swapping for SMS-based MFA).
4. Consider Information Storage and Dealing with: Assess how MFA-related information like tokens, restoration keys and biometric information is saved and managed. Guarantee information is securely encrypted at relaxation and in transit and isn’t saved in plaintext or uncovered to unauthorized entry.
5. Conduct Penetration Testing: Carry out penetration checks specializing in MFA processes to simulate potential assaults (e.g., brute-force assaults, man-in-the-middle assaults, phishing assaults). This helps to establish any flaws within the MFA implementation that may very well be exploited.
6. Examine for Replay Assaults: Confirm that the MFA implementation consists of protections towards replay assaults, equivalent to nonce values, timestamps, or distinctive session IDs, to make sure that authentication requests can’t be reused.
7. Assess Usability and Resilience: Take a look at the usability of the MFA course of to make sure it doesn’t hinder legit consumer entry whereas sustaining safety. Additionally, test how the system responds below stress (e.g., excessive visitors or denial-of-service assaults) to make sure MFA stays resilient.
8. Commonly Replace and Monitor: Make sure that MFA mechanisms are often up to date to deal with new threats and vulnerabilities. Constantly monitor for anomalies or suspicious exercise associated to MFA.

By integrating these cellular app threat administration methods, you may totally take a look at your cellular app’s MFA implementation to make sure robust safety with out compromising usability. Attain out to our workforce of consultants to learn the way we mix threat tiering, progressive testing and orchestrated remediation to guard your app ecosystem.