{"id":1634,"date":"2019-12-26T19:14:45","date_gmt":"2019-12-26T18:14:45","guid":{"rendered":"http:\/\/plus.maciejpiasecki.info\/index.php\/2019\/12\/26\/two-factor-authentication-is-even-less-secure-than-you-thought\/"},"modified":"2019-12-26T21:08:31","modified_gmt":"2019-12-26T20:08:31","slug":"two-factor-authentication-is-even-less-secure-than-you-thought","status":"publish","type":"post","link":"https:\/\/plus.maciejpiasecki.info\/index.php\/2019\/12\/26\/two-factor-authentication-is-even-less-secure-than-you-thought\/","title":{"rendered":"Two-Factor Authentication Is Even Less Secure Than You Thought"},"content":{"rendered":"<p>Two-Factor Authentication may not be secure enough to protect users against intrusion, based on a recently reported outline released by researchers at Fox-IT. The outline highlights efforts by a Chinese hacker group called APT20. The group, via a method Fox-IT has labeled &#8222;Operation Wocao,&#8221; appears to have found a way to bypass the commonly used security measure without setting off any alarms.<br \/>\nThe group began by hacking web servers but shifted focus. Using an RSA SecurID software token stolen from a hacked system, APT20 was able to make its way through other two-factor barriers. That was accomplished via modification of the key and by importing the SecurID Token Seed.<br \/>\nIn effect, the group was able to utilize tokens generated by a system to show a valid result. It then used that result to fool other systems into allowing access. That lets the group bypass the need to generate or steal a system-specific key.<br \/>\nThis may be a bigger threat for users in China than anywhere else<br \/>\nThe methodology used by the hackers in this case likely only works with specific systems but may also be able to be applied more broadly. The impact may be far-reaching. Summarily, APT20 seems to have greatly simplified the process of cracking authentication over previous methods.<br \/>\nTypically, hackers need to go through the trouble of finding the system-specific key or use some other complex method. The new hack makes it a more straightforward process. It may not be much more difficult than getting to where two-factor authentication is used to secure a system.<br \/>\nThe biggest threat may actually be to users in China. Not only does APT20 originate there. It&#8217;s also alleged to have direct ties to the Chinese government. At the very least, it has chiefly placed its focus on breaking down secure systems used for VPNs in China.<br \/>\nThe Chinese government has often been accused of being oppressive to citizens. That&#8217;s chiefly because it denies access to certain websites and information, often pertaining to ideologies surrounding protest and individual rights and freedoms espoused by Western powers. As a result, VPNs are used in the region to access websites, apps, and information that the government would rather citizens don&#8217;t access.<br \/>\nNot only could other governments easily follow suit. The applications for the new method may become more widespread, rendering traditional two-factor authentication obsolete. At a minimum, the discovery may change the way two-factor authentication is utilized and marketed. But changes may ultimately be required to keep users and their data safe.<br \/>\nCan two-factor authentication be made more secure?<br \/>\nNo solutions to the newfound problem appear to be forthcoming and none have reportedly been presented by researchers. But that doesn&#8217;t mean the two-factor problem is unsolvable. One plausible solution would be to make system-specific two-factor checking more individualized and unique.<br \/>\nFor instance, it may be possible to build in two-factor authentication so that each checking mechanism is more system-specific. It may be possible to ensure that each SecurID Token Seed is more uniquely generated between systems. Conversely, some new methods for protecting users may be required since it&#8217;s unclear what exactly the extent of the problem might be.<br \/>\nThe post Two-Factor Authentication Is Even Less Secure Than You Thought appeared first on Android Headlines.&#013;<br \/>\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/plus.maciejpiasecki.info\/wp-content\/uploads\/2019\/12\/Xiaomi-Security-Compromised-Illustration-Hack-AH-Spring-2019-1-600x338-1.jpg\" width=\"600\" height=\"338\">&#013;<br \/>\nSource: ndroidheadlines.com&#013;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Two-Factor Authentication may not be secure enough to protect users against intrusion, based on a recently reported outline released by [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":1635,"comment_status":"false","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1634","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bez-kategorii"],"_links":{"self":[{"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/posts\/1634","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/comments?post=1634"}],"version-history":[{"count":1,"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/posts\/1634\/revisions"}],"predecessor-version":[{"id":1636,"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/posts\/1634\/revisions\/1636"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/media\/1635"}],"wp:attachment":[{"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/media?parent=1634"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/categories?post=1634"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/tags?post=1634"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}