Now, even hardware-based 2FA is not entirely safe — Steemit (2024)

Now, even hardware-based 2FA is not entirely safe — Steemit (1)

A fake Yubikey next to the real one. Source: Motherboard

Two security researchers at the recent DEFCON conference have demonstrated that even hardware-based 2-factor authentication devices are not as safe as people think they are. They managed to hack 2 popular devices - the Yubikey, and RSA tokens.

Now, even hardware-based 2FA is not entirely safe — Steemit (2)

The Yubikey is a USB drive-like device, that when setup, has to be plugged-in everytime you login to an account. So you enter your password, and insert your Yubikey into the USB slot. RSA tokens are little devices, that generate a random code at fixed intervals(generally every minute) which has to be entered while logging in. The random code is based on a 'seed' value that is unique for every device. Basically, it's like a hardware version of the Google Authenticator app(there also are software RSA token apps that do the same thing).

In the case of the Yubikey, the code for making an arduino emulate a Yubikey is available online, but the unique thing that these researchers did, is they also tried to emulate the hardware. They created a fake Yubikey(which they call the 'Doobiekey'), and demonstrated the device being sucessfully registered with Yubikey servers. As for the RSA tokens, what the researchers did was arguably even more impressive. They created custom hardware and software which, after generating a random key, will be broadcast to everyone via bluetooth.In the case of the Yubikey, the hack only works when someone is registering the device for the first time. Emulation of a device that has already been registered is not possible. In the case of the RSA token, again, the hack doesn't work with existing devices, because they don't have bluetooth.

I think one thing that teaches me is:

Get your device from a trusted source.

That is the one way to ensure that devices like these cannot be hacked. While these devices are incredibly secure during day-to-day use, the one weak point in the chain is when you first setup these devices. Ensuring that the device is genuine, and from a trusted source, will take care of these supply-chain based security vulnerabilities. I think this kind of hack would never work in corporate setting, because someone who is purchasing these devices for the whole company would never do so(or rather, should never do so) from anyone but the company that manufactures them. I think this attack is much more capable at an individual level.

So, in conclusion, don't buy hardware from sketchy sources.

Sources:

Motherboard Article: https://motherboard.vice.com/en_us/article/8xazek/hackers-show-proof-of-concepts-to-beat-hardware-based-2fa

Yubikey image from Motherboard article. RSA token image from Wikipedia.

If you liked this post, don't forget to upvote and resteem. Follow me if you want more content like this :-)

Now, even hardware-based 2FA is not entirely safe — Steemit (2024)

FAQs

Now, even hardware-based 2FA is not entirely safe — Steemit? ›

Two security researchers at the recent DEFCON conference have demonstrated that even hardware-based 2-factor authentication devices are not as safe as people think they are. They managed to hack 2 popular devices - the Yubikey, and RSA tokens.

Why is 2FA no longer safe? ›

Even if the user doesn't respond to a push login request or doesn't enter a One-Time Password (OTP) when prompted, a hacker still knows they have a working password now; how, because the delay for the denied message takes longer... Most of us know where this is going; the hacker is persistent in their login attempts.

Is it possible to get hacked even with 2FA? ›

Physical theft of devices or hardware tokens can compromise the security of 2FA. If a hacker gains physical access to your device or token, they may be able to bypass the authentication process and gain unauthorized access to your accounts.

Has YubiKey ever been hacked? ›

There have been instances where YubiKeys have been hacked or compromised. Common attack vectors on hardware keys include physical attacks, side-channel attacks, and firmware vulnerabilities. Physical attacks involve physically accessing the device and extracting sensitive information from it.

Is 2FA really safe? ›

Benefits of 2FA Implementation

2FA provides an additional layer of security beyond traditional username and password combinations. This extra step ensures that even if login credentials are compromised, unauthorized access is prevented without the second factor.

How do hackers defeat 2FA? ›

Another way how 2-step verification can be hacked is via credential stuffing, where attackers try to breach a system using lists of compromised usernames and passwords. Bots are often used to automate the process and maximise the chances of getting a successful hit.

What is the least secure 2FA? ›

In summary, SMS-based 2FA is easier to set up and use, but it is not as secure as TOTP-based 2FA. TOTP-based 2FA is more secure but requires an additional app to be installed on your smartphone.

Has Google Authenticator been hacked? ›

However, this isn't the first time security issues have been reported for Google Authenticator. In 2020, an Android malware strain was reported as extracting and stealing one-time passcodes generated through Google Authenticator.

What happens to 2FA if I lose my phone? ›

If you've lost access to your 2FA device, you can recover your account by using backup codes, alternative recovery options like a secondary email or phone number, or by contacting customer support. Be ready to confirm your identity by answering a few security questions or providing proof of ID.

What is the problem with 2FA? ›

The primary vulnerability of current 2FA methods is their dependency on device authentication rather than true identity authentication, so any solution that promises to improve this mechanism must help machines better discern true human identities.

What is safer than 2FA? ›

Multi-factor authentication (MFA) is more secure than two-factor authentication (2FA) These two terms are often used interchangeably, but they're not quite the same thing. 2FA requires exactly two authentication types to unlock something. MFA requires a minimum of three forms of authentication.

What is the safest 2FA app? ›

  • Best for Privacy and Backups. 2FAS. $0.00 at Google Play. ...
  • Best for Android and Extra Security. Aegis Authenticator. $0.00 at Beem Development. ...
  • Best for Workforces. Duo Mobile. $0.00 at Duo. ...
  • Best for Google Fans. Google Authenticator. ...
  • Best for Microsoft Accounts. Microsoft Authenticator. ...
  • Best for Apple Watch Users. Authy.

What are some of the problems of 2FA? ›

The one true problem that keeps 2FA from really being a solid solution in my mind is that at some point, there has to be a point of authentication that is implicitly trusted. Say you have a site that sends you an email with a code to authenticate to that site.

Top Articles
Latest Posts
Article information

Author: Jerrold Considine

Last Updated:

Views: 5989

Rating: 4.8 / 5 (58 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: Jerrold Considine

Birthday: 1993-11-03

Address: Suite 447 3463 Marybelle Circles, New Marlin, AL 20765

Phone: +5816749283868

Job: Sales Executive

Hobby: Air sports, Sand art, Electronics, LARPing, Baseball, Book restoration, Puzzles

Introduction: My name is Jerrold Considine, I am a combative, cheerful, encouraging, happy, enthusiastic, funny, kind person who loves writing and wants to share my knowledge and understanding with you.