{"id":62721,"date":"2023-08-01T14:54:00","date_gmt":"2023-08-01T18:54:00","guid":{"rendered":"https:\/\/www2.stetson.edu\/law\/docket\/?p=62721"},"modified":"2023-08-01T08:17:22","modified_gmt":"2023-08-01T12:17:22","slug":"mfa-fatigue-scams","status":"publish","type":"post","link":"https:\/\/www2.stetson.edu\/law\/docket\/mfa-fatigue-scams\/","title":{"rendered":"MFA Fatigue Scams"},"content":{"rendered":"\n<p>Multi-factor authentication (MFA) helps protect your online accounts by making you approve login attempts. However, enabling MFA doesn\u2019t guarantee that your information is safe. If cybercriminals get your login credentials, they can use a tactic called MFA fatigue to try to access your account. In MFA fatigue scams, cybercriminals try to overwhelm you with prompts via email, text message, or phone call so you approve their login attempt.<\/p>\n\n\n\n<p><strong>Fake Support Text Messages<\/strong><\/p>\n\n\n\n<p>To set up this scam, cybercriminals trigger repeated MFA prompts by attempting to log in to your account multiple times. Then, they text you and claim to be a support team representative who has noticed the unusual behavior. To verify your identity and protect your account, the representative says that you need to approve the prompt. However, if you approve the prompt, the cybercriminals will be able to access your account.<\/p>\n\n\n\n<p><strong>Verification by Phone Call<\/strong><\/p>\n\n\n\n<p>In another MFA fatigue scam, cybercriminals wait until it\u2019s late at night when you\u2019re likely asleep and unprepared. Then, they attempt to log in to your account using your credentials. If they\u2019re successful, they\u2019ll request a phone call MFA prompt to the phone number you use for MFA. If you answer the phone call and press the button to verify your identity, you\u2019ll grant the cybercriminals access to your account.<\/p>\n\n\n\n<p><strong>What Can I Do to Stay Safe?<\/strong><\/p>\n\n\n\n<p>Follow the tips below to stay safe from MFA fatigue scams:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Never approve an MFA prompt you didn\u2019t request.&nbsp;<\/li>\n\n\n\n<li>If you receive an MFA prompt you didn\u2019t request, immediately change your password for the associated account. You should also consider updating passwords for accounts that use the same credentials.<\/li>\n\n\n\n<li>Create unique, strong passwords for each of your accounts. Without your password, it\u2019s difficult for cybercriminals to reach the MFA step of the login process.<\/li>\n<\/ul>\n\n\n\n<p>Remember&#8230;&nbsp;Stop, Look, and Think. Don&#8217;t be fooled.<\/p>\n\n\n\n<p>Regards,<br>Information Technology Department<br><strong>STETSON UNIVERSITY College of Law<\/strong><br>1401 61st Street South | Gulfport, FL 33707<br><strong>Email:<\/strong> <a rel=\"noreferrer noopener\" href=\"mailto:william.delgado@law.stetson.edu\" target=\"_blank\">it@law.stetson.edu<\/a>\u00a0 | <strong>Office:<\/strong> +1 (727) 562 7232<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Multi-factor authentication (MFA) helps protect your online accounts by making you approve login attempts. However, enabling MFA doesn\u2019t guarantee that your information is safe. If cybercriminals get your login credentials, [&hellip;]<\/p>\n","protected":false},"author":80,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9,10,8],"tags":[],"class_list":["post-62721","post","type-post","status-publish","format-standard","hentry","category-faculty","category-staff","category-students"],"_links":{"self":[{"href":"https:\/\/www2.stetson.edu\/law\/docket\/wp-json\/wp\/v2\/posts\/62721","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.stetson.edu\/law\/docket\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.stetson.edu\/law\/docket\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.stetson.edu\/law\/docket\/wp-json\/wp\/v2\/users\/80"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.stetson.edu\/law\/docket\/wp-json\/wp\/v2\/comments?post=62721"}],"version-history":[{"count":2,"href":"https:\/\/www2.stetson.edu\/law\/docket\/wp-json\/wp\/v2\/posts\/62721\/revisions"}],"predecessor-version":[{"id":62733,"href":"https:\/\/www2.stetson.edu\/law\/docket\/wp-json\/wp\/v2\/posts\/62721\/revisions\/62733"}],"wp:attachment":[{"href":"https:\/\/www2.stetson.edu\/law\/docket\/wp-json\/wp\/v2\/media?parent=62721"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.stetson.edu\/law\/docket\/wp-json\/wp\/v2\/categories?post=62721"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.stetson.edu\/law\/docket\/wp-json\/wp\/v2\/tags?post=62721"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}