HomeCII/OTPasskey Redaction Attacks Compromise GitHub, Microsoft Authentication

Passkey Redaction Attacks Compromise GitHub, Microsoft Authentication

Published on

spot_img

Passkey technology has long been hailed as a secure way to protect online accounts from cyberattacks. However, recent findings by Joe Stewart, a principal security researcher with eSentire’s Threat Response Unit (TRU), have revealed significant vulnerabilities in the implementation of passkeys that could potentially leave users’ accounts exposed to compromise.

Stewart highlighted the issue of adversary-in-the-middle (AitM) attacks, which can completely bypass passkey authentication on various platforms such as banking, e-commerce, social media, and more. These attacks involve manipulating the login interface so that users are not presented with the passkey option at all, allowing attackers to intercept credentials and gain unauthorized access to accounts.

In a proof-of-concept demonstration, Stewart showed how the open-source Evilginx AitM software could be used to alter the GitHub login page, effectively hiding the passkey authentication option and redirecting users to less-secure login methods. This manipulation could lead users to unwittingly disclose their credentials to attackers, putting their accounts at risk of compromise.

Moreover, even when passkeys are used as a second factor of authentication, they are not immune to AitM attacks. By rewriting the HTML of the login page or using injected JavaScript, attackers can bypass passkey authentication and steal users’ credentials and tokens. This flaw in passkey implementations poses a significant security risk for users across various platforms.

Stewart emphasized that these vulnerabilities are not inherent to passkeys themselves but rather stem from the lack of awareness and maturity in authentication methods. Users often lack the knowledge to recognize manipulated login pages, while implementers may not fully understand the risks of AitM attacks. Additionally, the need for account recovery options in case of passkey loss or device theft introduces further vulnerabilities that attackers can exploit.

To address these security challenges, Stewart suggested implementing more secure account recovery methods such as magic links, which offer a direct connection to the real site and bypass potential phishing attempts. He also recommended using additional security layers like one-time links with short timeouts and restricting logins to authenticated IP addresses to enhance account security.

While some vendors have expressed openness to new approaches to mitigate AitM attacks, the widespread adoption of more secure authentication methods remains a challenge. Stewart advocated for greater user education on passkeys and recommended the use of multiple passkeys to prevent account lockout in case of loss.

Overall, enterprises can enhance their defenses against passkey redaction attacks by using hardware-based keys, enforcing complex and unique fallback passwords, and configuring conditional access policies to prevent proxied logins. By proactively addressing these vulnerabilities and promoting more secure authentication practices, organizations can better protect their users from cyber threats.

In conclusion, the discovery of vulnerabilities in passkey authentication highlights the importance of continuous vigilance and improvement in online security practices. As cyber threats evolve, stakeholders must remain proactive in implementing robust security measures to safeguard users’ sensitive information and prevent unauthorized access to accounts.

Source link

Latest articles

Europol Nets 30 in The Com Crackdown

Europol’s Project Compass has made significant strides in combatting cybercrime, targeting a network known...

Bug in Google’s Gemini AI Panel Enables Potential Hijacking

Security Breach: The Critical Vulnerability That Poses Risks to User Privacy and System Integrity In...

ClawJacked Bug Allows Covert Hijacking of AI Agents

Urgent Call for OpenClaw Users to Upgrade After Critical Security Flaw Discovered Users of OpenClaw,...

Project Compass Operation Cracks Down on The Com Cybercrime Collective

Major Offensive Against Transnational Cybercrime Network: Project Compass An international law enforcement initiative, dubbed Project...

More like this

Europol Nets 30 in The Com Crackdown

Europol’s Project Compass has made significant strides in combatting cybercrime, targeting a network known...

Bug in Google’s Gemini AI Panel Enables Potential Hijacking

Security Breach: The Critical Vulnerability That Poses Risks to User Privacy and System Integrity In...

ClawJacked Bug Allows Covert Hijacking of AI Agents

Urgent Call for OpenClaw Users to Upgrade After Critical Security Flaw Discovered Users of OpenClaw,...