Flaw has Microsoft Authenticator overwriting MFA accounts, locking users out
A design flaw in Microsoft Authenticator causes account lockouts when adding new accounts via QR code, as it overwrites existing ones without proper notification, leading to user frustration and confusion.
Read original articleA design flaw in Microsoft Authenticator is causing users to be locked out of their accounts when they add new accounts via QR code. The app overwrites existing accounts with the same username, typically an email address, without adequately notifying users of the consequences. This issue has persisted since the app's launch in 2016, despite user complaints dating back to 2020. Unlike other authenticator apps, which include the issuer's name to prevent such overwrites, Microsoft Authenticator only uses the username, leading to confusion and frustration among users. Microsoft has acknowledged the issue but claims it is functioning as intended, placing the blame on users and the vendors providing the QR codes. Experts have criticized this design flaw, noting that it creates unnecessary helpdesk burdens and questioning why organizations would choose Microsoft Authenticator over other options. Workarounds include using different authentication apps or manually entering codes instead of scanning QR codes. The situation highlights a broader issue of usability in cybersecurity tools, where design decisions can significantly impact user experience and security.
- Microsoft Authenticator overwrites existing accounts when adding new ones via QR code, causing user lockouts.
- The app only uses usernames, typically email addresses, leading to conflicts and confusion.
- Microsoft claims the issue is a feature, blaming users and vendors for the problem.
- Experts recommend using alternative authenticator apps to avoid this issue.
- The situation underscores the importance of usability in cybersecurity applications.
Related
Windows: Insecure by Design
Ongoing security issues in Microsoft Windows include vulnerabilities like CVE-2024-30080 and CVE-2024-30078, criticized for potential remote code execution. Concerns raised about privacy with Recall feature, Windows 11 setup, and OneDrive integration. Advocacy for Linux desktops due to security and privacy frustrations.
How MFA is falling short
Multi-factor authentication (MFA) faces challenges from cyber attackers exploiting weaknesses. Breaches despite VPN, SSO, and Google Authenticator usage show risks like phishing, vishing, and Man-In-The-Middle attacks. Recent developments include "Tycoon 2FA" targeting Microsoft 365 and Gmail accounts, emphasizing the need for stronger authentication methods.
Microsoft Orders China Staff to Use iPhones for Work and Drop Android
Microsoft mandates employees in China to switch to iPhones for work by September, enhancing cybersecurity through Apple devices for identity verification. The move aligns with broader security initiatives against cyber threats.
Microsoft Employees in China Forced to Switch from Android to iPhones
Microsoft is requiring employees in China to use company-provided iPhone 15s, Microsoft's Authenticator, and Identity Pass app for work due to cybersecurity concerns. This move aims to enhance security measures.
Microsoft tells China employees to only use iPhones and ditch Android
Microsoft mandates employees in China to switch to iPhones for work, enforcing cybersecurity with Authenticator and Identity Pass apps due to Google Play restrictions. The move follows security breaches, prompting enhanced defenses.
- Many users express frustration with the design flaw that leads to account lockouts when adding new accounts via QR code.
- Several commenters share similar experiences with other authentication apps, highlighting a broader issue in usability and security practices.
- There is a consensus that the problem stems from poor product management and design choices rather than just technical errors.
- Some users advocate for alternative authentication methods or apps, citing better reliability and user experience.
- Concerns about the overall security and usability of authentication systems are prevalent, with calls for more user-friendly solutions.
This really rings true. Just think of all the nonsense you have to deal with in the name of "security." Mandatory password change intervals. Insane rules for constructing passwords. Completely undocumented password requirements that you just have to figure out by trial and error. Complicated error messages full of security jargon. "Secret Questions" that you can't remember the answers to. And on the other side of the coin, the security of these systems themselves is like a sieve. So many data breaches, information disclosures, they are in the news almost daily. I often wonder how they get away with it all.
Is no-one at Microsoft actually using their own Authenticator? Unless I'm missing something, this would make it nearly unusable for almost all applications - as soon as you've used your email for one site you wouldn't be able to add it for any others?
> Action required: Enable multifactor authentication for your tenant by 15 October 2024
> You’re receiving this email because you’re a global administrator for [Literally a UUID here, no organization name or anything] Starting 15 October 2024, we will require users to use multifactor authentication (MFA) to sign into the Azure portal, Microsoft Entra admin center, and Intune admin center. To ensure your users maintain access, you’ll need to enable MFA by 15 October 2024.
> If you can’t enable MFA for your users by that date, you’ll need to apply to postpone the enforcement date. If you don’t, your users will be required to set up MFA.
> Action required
> To identify which users are signing into Azure with and without MFA, refer to our documentation. > To ensure your users can access the Azure portal, Microsoft Entra admin center, and Intune admin center, enable MFA for your users by 15 October 2024. > If you can’t enable MFA by 15 October 2024, apply to postpone the enforcement date.
The thing is, I'm not administrating any organization with Microsoft.
I have a private office365 family account or whatever it's called, and I have 2FA set up for my account, I have no idea what they are on about, especially because the email doesn't contain even my name or the name of the supposed organization, just some ID.
It's definitely an Email from Microsoft though.
I used to use Google Authenticator with my GMail accounts, but disabled that out of fears it's just one more thing to go wrong, with Google providing little recourse.
My password is a bit over 96 bits of entropy, generated by extracting 256 bits from /dev/urandom as a multi-precision integer, divmod'ing to extract one instance from each of the character classes (digit, lower, uppper, symbol) and then the rest from the combined alphabet (digit + lower + upper + symbol), and finally the leftover entropy used for Fisher-Yates shuffle of the password so the first digit isn't always a digit, etc. Passwords are per-site, stored using a gpg-based password manager I wrote in the early 2000s.
MFA would still help for some types of ongoing active compromise, but not for dumps of password hashes from a DB compromise. It really kills me that recovery from my recovery email address doesn't work, even though I know my password.
Honestly, if you haven't logged in from anywhere in a few months and you have the correct password, they should at least just send some verification link/code to your recovery address without requiring you to tell them your recovery address. Sure, maybe don't say where you're sending the recovery link, but turning the recovery address into another password you need to memorize without ever telling you it's some weird combination of recovery email address and recovery password is just highly annoying.
I've never gotten that dialog, and have not had any issues with the accounts I've added. Since they're my work accounts, 99% of them share my work email as account name.
So does that mean I've just been lucky, in that the sites I've signed with have provided a sufficiently unique label? I feel I didn't fully get what the issue is.
https://bugs.webkit.org/show_bug.cgi?id=270553
Safari still has some bugs where it can't discern between websites hosted on different Subdomains except for hardcoded exceptions and it will override password of one subdomain with the other. Happens to me on a monthly basis.
Generally, unless you are targeted by someone with a sim swap, it is good enough. Most people won't be targeted, but do have a good chance of something going wrong that makes them lose their MFA key.
I even have a matching icon of the issuer for each entry; the issuer is registered for each entry.
I am using the MS Authenticator for years and I've never had any problem of that sort, and of course, I am always using the same email as my account/username.
Anyway, I'm just putting the result of my test. It's not like this going to change your mind about the authenticator or Microsoft itself here...
Spot on right. They should have been more prudent in selecting services. Absolutely right, users' and clients' fault it is!
You see a smug bastard company that hurts the client they live on because they provide faulty service, they hurt repeatedly, in thick queue throughout time, for long time, fault after fault after fault and just release the smear the responsibility elsewhere department on the clients complaining, whatever the official title of this department is, PR or whatever, while the issues are reported in news everywhere, publicised, then who would you blame? The company, or the clients still choosing the company against common sense and own experience?
The case touches me because I am approaching a job where I would not use Windows anymore, I am tired of the Windows ecosystem. It only makes life differently complicated, or many times more complicated, more difficult to do my job than without it. I have not enough time listing how many things they made much worse in the past decade or more that my every day is a swimm through the flow of piss MS releases day after day at all of us. They were better in some short period long ago, only partially still, after some very bad historic period, now they are determined that with hard work they will f up all what is left.
I have a friend working on the MS Teams. He is very busy, working hard, they will release some sort of AR meet feature, packed with complex and revolutionary (i.e. experimental) approaches so you could enjoy solutions that probably will work ok and not annoy you with visual artefacts and problems not eliminated before release, with the headset you require for it, probably will not be forced on you but likely annoy the hell out of you by the pop up promotions when you try to do your urgent job after a critical update. Who the f needs that? While the Teams is a mess to work with already with lots of noise and half cooked bloated whatevers already being a distaction, not helpful, not at all. Probably only the call quality is the only good in it by now, but that was purchased from elsewhere, that was given to them. They are so good making things too complicated and being unable making it well because it is too complicated to do well, too expensive, so let's just release a half cooked one and leave it there for decades (like the dialogs in Windows) and put the blame on elsewhere by the put the blame on elsewhere department put together precisely for this.
GitHub barely works after the acquisition. Azure is a joke. Teams is the bane of my existance. Outlook is the second one.
Do they need to ask harder leetcoding problems during the interviews?
But modern mobile apps have an architecture that makes reading directly from the filesystem the exception, rather than the rule, which leads to apps directly managing all their data in their own database, rather than in a shared filesystem. This removes a lot of user agency, and opens the door to tough-to-remediate bugs, like a new version of the app corrupting or erasing old data.
> Microsoft Authenticator will overwrite an account with the same username. Given the prominent use of email addresses for usernames, most users’ apps share the same username. Google Authenticator and just about every other authenticator app add the name of the issuer — such as a bank or a car company — to avoid this issue. Microsoft only uses the username.
I feel like mobile took a step backward when it made the filesystem a second-class citizen, despite some of the security improvements mobile brought with app sandboxing. Restoring from a backup would have fully remediated this issue, at least once folks understood what was causing it.
Today it's a MS fuckup, but any such system could malfunction.
Email aliases look like yourname+somealias@gmail.com
This also helps avoid social engineering attacks when people call into your provider:
https://www.wired.com/2012/08/apple-amazon-mat-honan-hacking...
I just checked my app., there are 2 different emails for 2 entries, other entries are provider specific.
Is there a good way to migrate from MS Authenticator and what options do I have?
One of the entries without the Issuer correctly set is Outlook.com itself. WTF!
Seems like an apt description. :)
Well I can tell you why people pick MS Authenticator - it's because microsoft basically forces it on you, uses dark patterns to avoid letting you use any other standard OTP app and doesn't give admins the tools to disable it.
As an admin, I can disable every single MFA method individually, including TOTP, but Microsoft Authenticator is force-enabled. When users go to enable TOTP (or are forced to), the option is called "Microsoft Authenticator", not something more generic. The QR code they get is not a standard TOTP one, so any other client will reject it. There's a small link below it letting you "use another app" which finally gives you a real TOTP QR code. This is INSANE!
/s
Related
Windows: Insecure by Design
Ongoing security issues in Microsoft Windows include vulnerabilities like CVE-2024-30080 and CVE-2024-30078, criticized for potential remote code execution. Concerns raised about privacy with Recall feature, Windows 11 setup, and OneDrive integration. Advocacy for Linux desktops due to security and privacy frustrations.
How MFA is falling short
Multi-factor authentication (MFA) faces challenges from cyber attackers exploiting weaknesses. Breaches despite VPN, SSO, and Google Authenticator usage show risks like phishing, vishing, and Man-In-The-Middle attacks. Recent developments include "Tycoon 2FA" targeting Microsoft 365 and Gmail accounts, emphasizing the need for stronger authentication methods.
Microsoft Orders China Staff to Use iPhones for Work and Drop Android
Microsoft mandates employees in China to switch to iPhones for work by September, enhancing cybersecurity through Apple devices for identity verification. The move aligns with broader security initiatives against cyber threats.
Microsoft Employees in China Forced to Switch from Android to iPhones
Microsoft is requiring employees in China to use company-provided iPhone 15s, Microsoft's Authenticator, and Identity Pass app for work due to cybersecurity concerns. This move aims to enhance security measures.
Microsoft tells China employees to only use iPhones and ditch Android
Microsoft mandates employees in China to switch to iPhones for work, enforcing cybersecurity with Authenticator and Identity Pass apps due to Google Play restrictions. The move follows security breaches, prompting enhanced defenses.