Emerging Threats with Windows 11's Passkey Synchronization
Written by Memcyco Product VP, Arthur Zavalkovsky .
Microsoft is set to revolutionize authentication with the upcoming support for passkey synchronization across devices in Windows 11. This move towards a passwordless future promises enhanced security and convenience for users. However, as with any new technology, it introduces a range of potential threats that could be exploited by malicious actors.
What Are Passkeys?
Passkeys are a form of passwordless authentication that leverages public-key cryptography to provide secure and convenient access to online accounts and services. Unlike traditional passwords, which are often reused and vulnerable to phishing attacks, passkeys are unique to each user-device-service combination and are stored securely on the device.
How Do Passkeys Work?
When you register for a service using a passkey, your device generates a pair of cryptographic keys: a private key that stays on your device and a public key that is shared with the service. Authentication occurs when the service sends a challenge that your device signs using the private key, verifying your identity without transmitting sensitive information over the network. However, please, note that the need for a password is still there. Typically, the initial registration requires you to authenticate using a traditional password or another method to verify your identity before creating the passkey. Additionally, if your passkey for a service is lost—such as when you lose your device—you may need to use your password or another recovery method to regain access to your account.
Benefits of Passkeys
How Does Synchronization Work in Windows 11?
Windows 11 aims to sync these passkeys across all devices linked to a user's Microsoft account. This means that once a passkey is created on one device, it becomes available on all other devices signed in with the same account, streamlining the user experience.
However, while passkeys present significant security improvements compared to traditional passwords and major usability improvements, new and existing threats still need to be addressed.
Emerging Threats
1. Authentication Method Redaction Attacks
Description: Authentication Method Redaction (AMR) attacks involve cybercriminals manipulating the authentication process to bypass secure methods like passkeys. Attackers use Adversary-in-the-Middle (AitM) phishing techniques to alter the login interface, forcing users to revert to less secure authentication methods such as passwords.
How It Works:
Severity: High
2. Recovery Key Vulnerabilities
Description: To access synced passkeys across devices, users must set up a recovery key. This introduces a new potential point of failure; if the recovery key is compromised, an attacker could access all synced passkeys.
How It Works:
Severity: High
3. Cross-Device Contamination
Description: If one device is compromised, malware can gain access to all web services the user uses, even if they were not accessed from the given device. Malware on one device might be able to access or manipulate passkeys, affecting all synced devices. For example, accessing a website and resetting the passkey could lead to a domino effect of security breaches across a user's entire device ecosystem.
How It Works:
Severity: Medium
4. Public Device Access Risks
Description: Passkey synchronization can lead to unintended access on public or shared devices. When users authenticate on these devices, they may inadvertently grant long-term access to their accounts if they forget to properly log out or delete their passkeys.
How It Works:
Severity: High
This threat highlights the need for clear user education on managing passkeys on shared or public devices and the importance of implementing automatic logout and passkey deletion features for non-personal devices.
5. User Behavior and Security Practices
Description: Users may become overly reliant on Microsoft's security measures, potentially neglecting other good security practices. This includes weak account passwords ( that must be defined and maintained as a fallback for when the user’s device cannot be used or when passkey access is disabled on the device), ignoring updates, and poor handling of personal security.
How It Works:
Severity: High
Bottom Line
While passkeys offer significant improvements in authentication security, they are not a silver bullet. Undoubtedly, passkeys offer significant improvements in user experience. But, contrary to popular belief, passkeys aren’t infallible when it comes to phishing-related website impersonation fraud and related scams. Ultimately, enterprises rolling out passkeys must fortify their passkey defenses with AI-assisted solutions like Memcyco that deliver real-time website impersonation and customer account takeover (ATO) protection.
References: