Two Factor Authentication Failure:  an authenticator app design vulnerability?

Two Factor Authentication Failure: an authenticator app design vulnerability?

Corporate IT mostly moved on from the 2FA dongle, like the SecureID dongle provided by RSA, about a decade ago.?Then there was the SMS text message for the additional ID verification.?Vulnerabilities associated with text messaging then drove the development of the authenticator app; the app that provides a continuously updated bespoke six-digit code to be used at login.

The authenticator apps are well designed in general, except some have, in my view, a serious design flaw, and represent a high security risk.

The stronger authentication process will only allow authentication to continue if the authorised user inputs a six-digit code that is generated at login.?Even if a hacker had both the user’s email address and password, it would be impossible for that remote hacker to simultaneously get through the security, i.e. get access to that six digit code, and therefor get access to the account.

However, there is now a new hybrid functionality that has been added to several authenticator apps, including, most worryingly, Microsoft Authenticator.?The user can simply click approve, rather than entering a six-digit code at login.??The problem is that if the user’s password has been compromised in a data breach (please see Have I Been Pwned for the list of huge user name and password breaches) or if the user has been unknowingly subject to an advanced, well-tailored phishing attack, the user’s account will be seriously vulnerable. The 2FA will not be worth its salt as illustrated by the following use case:

As soon as a hacker has the user email address and password and does the first stage of login to e.g. Office 365, the genuine account holder will then get a ‘please click’ approve pop up on their phone… showing their company name, and their email address per the image above.

Human nature would indicate that the great majority of users will click that approve – and suddenly, on the other side of the world, a hacker will be simultaneously granted access to their email and business folders.

Some Authenticator Apps will confirm if the IP and system spec are the same or new, at the same time as asking for the approval – this is slightly more secure – however a careless, stressed, or very busy user would still be prone to click automatically.

In IT security there is often the conflict between usability and security. Increased user convenience can result in increased security risk. The above is one example of this. If your authenticator app has this pop-up approval, the recommendation from hifo is that this functionality is disabled as soon as possible.

Manohar Lala

Tech Enthusiast| Managing Partner MaMo TechnoLabs|Growth Hacker | Sarcasm Overloaded

2 年

Thomas, thanks for sharing!

nick ioannou

IS & IT pro, Computing’s Top 100 IT Leaders, author & speaker, helping protect organisations & their data

4 年

This has been a concern of mine for a while now. Adding 2FA to Microsoft Office 365 accounts defaults to this 'approve from the app' sign-in rather than the 6 digit code, which you then have to set manually afterwards. You have to really want to sign-in to type in a six digit code, it's not something you do accidentally and because it takes longer than just clicking 'Approve' it gives you time to think whether the request is genuine or not.

要查看或添加评论,请登录

Thomas Naylor的更多文章

  • Trump is the "Art of the Brand"

    Trump is the "Art of the Brand"

    We all are told to create and indeed “curate” our own digital brand. Here on LinkedIn we are variously advised to be…

    3 条评论
  • A cautionary tale: AI does not understand what it reads and does not understand what it writes.

    A cautionary tale: AI does not understand what it reads and does not understand what it writes.

    It took about ten minutes of prompting for ChatGPT to generate the story below, and about a minute to get the image…

    1 条评论
  • Moscow's Govt systems hacked?

    Moscow's Govt systems hacked?

    Early this morning the Russian hacking group 'Nebula' claimed to have breached Moscow's government systems, including…

    2 条评论
  • Google decay?

    Google decay?

    While I was waiting in reception at the dentist this morning an email by Francis Scialabba from Morning Brew came in…

    5 条评论
  • Running out of runway...

    Running out of runway...

    “Running out of runway” is one of those expressions used in the world of start-ups. The concept is that you have this…

  • Straight from the horse's mouth!

    Straight from the horse's mouth!

    A recent post by Fabien Pinckaers, the founder of Odoo, resonated with me. Fabien compared the uptake of NetSuite and…

    3 条评论
  • The Cult of Monotony

    The Cult of Monotony

    People talk about "bot rot" - meaning AI bot generated gibberish. It's a useful term to bear in mind - not only because…

  • The review rollercoaster!

    The review rollercoaster!

    Uber and Restaurant reviews When I take an Uber I give five stars to the driver. The driver is then more likely to give…

  • A clever metaphor?

    A clever metaphor?

    The story of Green Eggs and Ham was written because Dr Seuss’s editor, Bennett Cerf, bet Dr Seuss that he could not…

  • Mind control at Tech Show 2023: When the Doctor made the Professor walk into the wall!

    Mind control at Tech Show 2023: When the Doctor made the Professor walk into the wall!

    Last week I visited the Tech Show London - kicked off with opening remarks by the chair of the show Zoe Kleinman…

社区洞察

其他会员也浏览了