2022 International Conference on Smart Information Systems and Technologies (SIST) 2022
DOI: 10.1109/sist54437.2022.9945766
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing 2FA Phishing Attacks and Their Prevention Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 7 publications
0
1
0
Order By: Relevance
“…However, if it is only mandatory for selected systems that deal with sensitive information, the acceptance rate is higher [3]. Nonetheless, second factors can also be bypassed, for example, by phishing [11] and push notifications [20]. Consequently, authentication attempts and all other steps within the authentication lifecycle have to be monitored [31] to identify attacks, such as what happened at FireEye in the case of SolarWinds' Orion attack [29,45].…”
mentioning
confidence: 99%
“…However, if it is only mandatory for selected systems that deal with sensitive information, the acceptance rate is higher [3]. Nonetheless, second factors can also be bypassed, for example, by phishing [11] and push notifications [20]. Consequently, authentication attempts and all other steps within the authentication lifecycle have to be monitored [31] to identify attacks, such as what happened at FireEye in the case of SolarWinds' Orion attack [29,45].…”
mentioning
confidence: 99%