Second Factor SMS: Worse Than Its Reputation
Security researchers accessed 200M 2FA-SMS messages, exposing a flaw in IdentifyMobile's system used by Google, Amazon, and Facebook. CCC recommends more secure authentication methods due to significant risks.
Read original articleSecurity researchers from the Chaos Computer Club (CCC) gained access to over 200 million SMS messages used for two-factor authentication (2FA-SMS) from 200 companies. The method, while offering more security than passwords alone, is vulnerable to attacks like SIM swapping and phishing. The CCC discovered a major security flaw where a provider of 2FA-SMS, IdentifyMobile, exposed sensitive data online, affecting companies like Google, Amazon, and Facebook. The leaked information included one-time passwords, phone numbers, and account details. While misusing the SMS codes typically requires the password as well, the exposed data posed significant risks to companies and customers. The CCC advises using more secure methods like app-generated passwords or hardware tokens instead of relying on 2FA-SMS, especially from providers with lax security measures like IdentifyMobile.
Related
How MFA is falling short
Multi-factor authentication (MFA) faces challenges from cyber attackers exploiting weaknesses. Breaches despite VPN, SSO, and Google Authenticator usage show risks like phishing, vishing, and Man-In-The-Middle attacks. Recent developments include "Tycoon 2FA" targeting Microsoft 365 and Gmail accounts, emphasizing the need for stronger authentication methods.
Twilio Confirms Data Breach After Hackers Leak 33M Authy User Phone Numbers
Twilio confirms data breach leaking 33 million phone numbers linked to Authy app. No evidence of system access or sensitive data compromise. Users advised to update security settings as precaution against phishing.
Authy got hacked, and 33M user phone numbers were stolen
Twilio updates Authy app after hack exposes 33 million phone numbers. No compromise to Authy accounts or sensitive data. Users urged to update iOS app, beware of phishing attacks. Twilio enhances security measures.
Twilio breach leaks over 30M Authy-linked phone numbers
A data breach in Authy exposed 33 million phone numbers due to an unsecured API. No passwords were leaked, but users are urged to secure accounts with 2FA, watch for scams, and lock SIM cards. Twilio has improved security measures. Update Authy app for safety.
1Password and 2FA: Is it wrong to store passwords and one-time codes together? (2023)
Storing passwords and 2FA codes in 1Password is secure and convenient. The debate over using separate authenticator apps for TOTP codes is discussed, emphasizing the importance of account security through individual preferences and risk tolerance.
I have accounts with 2 banks, one uses SMS 2fa and the other uses an app which generates a token. I had thought that the app was by default a better choice because of the inherent lack of security in SMS as a protcol BUT in the above attack the bank that sends the SMS would have been better because they send a different message when you're doing a transfer to a new payee than when you're logging in.
So really the ideal is not just having an app that generates a token but one that generates a specific type of token depending on what type of transaction you're performing and won't accept, for example, a login token when adding a new payee. I haven't seen any bank with that level of 2fa yet, has anyone else?
I guess perhaps passkeys make this obsolete anyway since it establishes a local physical connection to a piece of hardware.
[0] Ron Howard voice: "she eventually got it back"
NIST SP 800-63B §5.1.3.3. https://pages.nist.gov/800-63-3/sp800-63b.html#pstnOOB
The "1-click login" links are a concern and just having access to the SMS would be enough to take over things like WhatsApp.
But 2FA codes seem notably less worrying. They are the second factor and require an attacker to have the password too. For these cases I'm much more relaxed about the use of SMS and the risks of interception.
I hope that this will in due course be recognised as a terrible mistake and rectified. Unfortunately my hope is only faint.
https://en.wikipedia.org/wiki/BankID
It is amazing what a little cooperation between public and private institutions can achieve. It is the only way to login and 2fa to government services and most banks (some legacy systems are still supported by banks) and it works great.
It is incredible there is no system like this for every country, heck it is incredible that there isn't a system like this for the whole EU.
The CCC definition of this being only 2FA-SMS is incorrect though. It was not only Twilio Verify (2FA API) that was affected, it was all SMS sent through this vendor.
How interesting or uninteresting would bi-modal 2FA be ?
That is: you receive a code by text and you enter the code by email…
I haven’t spent any time to work out whether this significantly changes the attack surface but… At first glance it does seem like you would need to own two different account types…
… So I guess a first question would be: does this exist anywhere? Has anyone ever seen this or done this?
It described me the whole page, explaining it was a login page to log in to bank X in country Y. He compared the URL with the bank's name, etc.
Then I modified one letter in the URL, changing "https://online.banking.com" (just an example) to "https://online.banklng.com" and asked ChatGPT 4o again.
He said it was a phishing attempt.
So, basically, you can, today, already have a screenshot automatically analyzed and have a model tell you if it's seemingly legit or not.
But for login you basically register a single phone, download a certificate to it and that becomes your second factor. If you login via web or another phone, you need to approve the login from that phone.
Of course if you lose the phone (or it's damaged) you need to go to the bank to fix it, but that seems like a reasonable approach.
Unfortunately, for some other services, like banks or government agencies, you don’t have any option. You can only minimize the impact by using a unique password and username and keeping them updated.
I hope a day or another people will understand and IMPOSE an end to such crappy unsafe practice.
I mean, even if we disregard the auth codes thing, which according to CCC were being generated on a static timer, if someone did get access to this bucket - they would have gotten away with a juicy list of phone numbers and names from some of the top companies, at the very least.
I'm not sure how hard it would be for an S3 scanner to guess "idmdatastore", so it is difficult to say if anyone else got in. Even if not, a live database storing live data without encryption or anything is crazy. I feel like IdentifyMobile will feel the wrath of this no matter what.
[0]: https://stackdiary.com/twilio-issues-an-alert-about-a-securi...
All the articles and videos I found are like:
1. Attacker calls phone companies support hotline or alternatively his confidante there
2. ** MAGIC **
3. Atacker has access to SMS messages sent to victims number
I understand that some might be deliberately vague but I don't want a step by step instructions, just a high level technical overview.
And to give another hint why this is so hard for me to understand: To the best of my knowledge, if I call my phone company with whatever scenario that I can imagine that involves my SIM, all they will do is send me a new SIM to my physical address.
Google has recently started enforcing their own “click yes on already authorize mobile device” 2FA, which is very frustrating.
I have hardware 2FA keys that I keep in a safe. I deliberately do not keep them on me, and using them to re-auth is mentally an “event”.
This is not the case with my cell phone, which my kids play with, gets left on my dresser while the cleaners work, etc.
Really pushing me to run my own services again, but that obviously comes with its own challenges.
Your desktop, laptop, tablet, and phone can all share a password manager. They work offline and online. Passwords generated are unique, breaking password reuse attacks. Password managers support auto-filled TOTP codes per-login. They support passkeys. There's password managers built into browsers in addition to the 3rd party ones. There are personal, family, and enterprise options. They could be installed as a system service to isolate them from userland attacks. They support advanced functionality like SSH keys, git signing and biometrics.
If you're a stickler about having a completely independent factor from your desktop/phone/etc, password managers could be used with different profiles on different devices, and allow several easy ways to pass an auth token between devices (via sound, picture, bluetooth, network, etc), ensuring an independent device authenticates the login to avoid malware attacking the password manager.
We already have the tools to do something way more secure than SMS, and it's already on most of our devices/browsers. We just have to make it the preferred factor.
Related
How MFA is falling short
Multi-factor authentication (MFA) faces challenges from cyber attackers exploiting weaknesses. Breaches despite VPN, SSO, and Google Authenticator usage show risks like phishing, vishing, and Man-In-The-Middle attacks. Recent developments include "Tycoon 2FA" targeting Microsoft 365 and Gmail accounts, emphasizing the need for stronger authentication methods.
Twilio Confirms Data Breach After Hackers Leak 33M Authy User Phone Numbers
Twilio confirms data breach leaking 33 million phone numbers linked to Authy app. No evidence of system access or sensitive data compromise. Users advised to update security settings as precaution against phishing.
Authy got hacked, and 33M user phone numbers were stolen
Twilio updates Authy app after hack exposes 33 million phone numbers. No compromise to Authy accounts or sensitive data. Users urged to update iOS app, beware of phishing attacks. Twilio enhances security measures.
Twilio breach leaks over 30M Authy-linked phone numbers
A data breach in Authy exposed 33 million phone numbers due to an unsecured API. No passwords were leaked, but users are urged to secure accounts with 2FA, watch for scams, and lock SIM cards. Twilio has improved security measures. Update Authy app for safety.
1Password and 2FA: Is it wrong to store passwords and one-time codes together? (2023)
Storing passwords and 2FA codes in 1Password is secure and convenient. The debate over using separate authenticator apps for TOTP codes is discussed, emphasizing the importance of account security through individual preferences and risk tolerance.