Torrent Invites! Buy, Trade, Sell Or Find Free Invites, For EVERY Private Tracker! HDBits.org, BTN, PTP, MTV, Empornium, Orpheus, Bibliotik, RED, IPT, TL, PHD etc!



Results 1 to 2 of 2
  1. #1
    User Trina's Avatar
    Reputation Points
    10
    Reputation Power
    32
    Join Date
    Oct 2015
    Posts
    30
    Time Online
    2 d 3 h 21 m
    Avg. Time Online
    N/A
    Mentioned
    4 Post(s)
    Quoted
    1 Post(s)
    Liked
    13 times
    Feedbacks
    0

    Academics claim Google Android two-factor authentication is breakable

    Academics claim Google Android two-factor authentication is breakable

    Playstore issues impact SMS verification, they allege


    Author: John Leyden

    Computer security researchers warn security shortcomings in Android/Playstore undermine the security offered by all SMS-based two-factor authentication (2FA).

    The issue - first reported to Google more than a year ago - revolves around an alleged security weakness rather than a straightforward software vulnerability. The BAndroid vulnerability was presented at the Android Security Symposium in Vienna last September by Victor van der Even of Vrije Universiteit, Amsterdam. In the BAndroid microsite (featuring a video and FAQ), the Dutch researchers explain the cause and scope of the alleged vulnerability.

    If attackers have control over the browser on the PC of a user using Google services (like Gmail, Google+, etc.), they can push any app with any permission on any of the user's Android devices, and activate it - allowing one to bypass 2-factor authentication via the phone. Moreover, the installation can be stealthy (without any icon appearing on the screen). For short, we refer to the vulnerability as the BAndroid (Browser-to-Android) vulnerability and to attacks that abuse it as BAndroid attacks.

    A paper about the issue was published at the Financial Crypto conference back in February. A research paper looking at the wider issues of phone-based 2FA, How Anywhere Computing Just Killed Your Phone-Based Two-Factor Authentication on can be found here (PDF). In the paper, the researchers argue that Apple's Continuity feature that brings iOS and Mac OS X devices closer together is equally dangerous.

    In the paper, the Dutch researchers, Radhesh Krishnan Konoth and Victor van der Even, argue that the "process of integrating apps among multiple platforms essentially removes the gap between them", which is important for security.

    The ongoing integration and desire for increased usability results in violation of key principles for mobile phone 2FA. As a result, we identify a new class of vulnerabilities dubbed 2FA synchronization vulnerabilities. To support our findings, we present practical attacks against Android and iOS that illustrate how a Man-in-the-Browser attack can be elevated to intercept One-Time Passwords sent to the mobile phone and thus bypass the chain of 2FA mechanisms as used by many financial services.

    Herbert Bos, professor of systems and security at Vrije Universiteit Amsterdam, who co-authored the mobile security paper with the two PhD students, stated that the researchers responsibly disclosed the security vulnerability to Google more than a year ago but claims that the tech giant "still refuses to fix it".

    "Security problem in Android/Play store kills the security offered by all SMS-based two factor authentication (as used by many banks, governments, and, interestingly, Google itself). Google does not want to fix it (it is part of the design), but really, it should," he added.

  2. #2
    Donor
    salam2009's Avatar
    Reputation Points
    11218
    Reputation Power
    100
    Join Date
    Apr 2016
    Posts
    120
    Time Online
    7 d 9 h 35 m
    Avg. Time Online
    3 m
    Mentioned
    9 Post(s)
    Quoted
    16 Post(s)
    Liked
    7 times
    Feedbacks
    0
    Thanks for sharing!


Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •