Bypass Method of Two-Factor Authentication

Two-factor authentication (2FA or Two-Factor ), θεωρείται μαζί με τη χρήση βιομετρικών στοιχείων σαν μία από τις ισχυρότερες μεθόδους προστασίας των δεδομένων του χρήστη στο διαδίκτυο. Μια νέα επίθεση που επινοήθηκε από δύο ερευνητές από το πανεπιστήμιο του Άμστερνταμ δείχνει ότι υπάρχουν αδύνατα and in this protection method.phone Two-Factor Authentication

Two researchers, Radhesh Krishnan Konoth and Victor van der Even, reported discovering the security flaw in 2014, alerting Google and others υπηρεσίες, παρουσίασαν τα ευρήματά τους σε , but nothing changed.

As the investigators explained, because the vulnerability had not yet been publicly announced (to date), many were the ones who said it was not very risky. The two researchers do not agree.

As they explain, they do not use a software defect, but a two-factor authentication problem.

Το concept ονομάζεται "anywhere computing," και αναφέρεται στην ικανότητα συγχρονισμού των εφαρμογές και του περιεχομένου σε όλες τις συσκευές. Χρησιμοποιώντας λοιπόν το anywhere computing το 2FA μπορεί να παρακαμφθεί αν κάποιος εισβολέας αποκτήσει πρόσβαση στον υπολογιστή του θύματος.

From there, design flaws in the 2FA engine of the various services allow attackers to use services such as iTunes or the Google Play Store to promote malicious applications to a user's phone without activating the 2FA authentication system and without displaying an icon on the home screen of the device indicating the installation of new software.

Of course, the attacker must pass the malware from Google Stores or Apple Stores, but we've seen this happen last time.

Researchers argue that services using 2FA should be very cautious with synchronizing applications between different devices.

For more information, you can see the video below. For those who want more details download the PDF How Anywhere Computing Just Killed Your Phone-Based Two-Factor Authentication.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).