Mobile
11/15/2017
02:30 PM
Seth Ruden
Seth Ruden
Commentary
50%
50%

Who Am I? Best Practices for Next-Gen Authentication

By their very nature, antiquated, static identifiers like Social Security numbers and dates of birth are worse than passwords.

There is no ignoring it: our financial security is compromised daily. Many security professionals reading this wouldn't hesitate to recount all the breaches they've been a part of as consumers: merchant breaches in which replacement cards forced you to update your linked accounts, or data compromises when personal information was stolen and identity theft protection was provided, forcing you to consider freezing new credit originations.

These are only the ones we know about, however. A recent report from SkyHigh Networks concluded that up to 7% of all Amazon S3 servers leave volumes of exposed via "public access" configuration. Consider the residual risk of all the data breaches we've historically been exposed to and the totality of this vulnerability becomes immense. Back in the first quarter of 2014, I suggested we were experiencing data breach fatigue; today it's data breach exhaustion, and consumers may now feel powerless.

These consumer attitudes are reflected in ACI Worldwide's "Global Consumer Trust and Security Perceptions Survey," which revealed that an average 65% of consumers across 20 countries stop shopping with a merchant or a retailer once they experience fraud or a data breach. In select regions like Brazil and Mexico, this figure rises as high as 86% and 84%, respectively. It is a risk that few are willing to take and a stern lesson in the strategic importance of data security across the enterprise in 2017.

We must ask ourselves, as both consumers and enterprise security professionals: What exactly is compromised here? What information falls into the hands of an attacker and how could they use it to attack me? As we're compromised once, twice, multiple times, we are falling under greater risk from hackers and fraudsters.

Typically, most concerning for consumers is the demographic data that is baked directly into authentication procedures. If an attacker has the relevant non-public personal information, they can coordinate illegitimate identity theft, use a payment card for unauthorized spending, or potentially take over a whole account.

So what lessons are out there? Well, for starters: Why are we still using knowledge-based authentication based on third-party-issued data elements to verify transactions? Government identity numbers such as Social Security numbers, home addresses, and users' date of births are "zombie authenticators," devoid of enterprise-caliber security, yet constantly resurfacing. By their very nature as sensitive data, these antiquated static authenticators are worse than passwords. And yet, despite being compromised multiple times and being available on occasion through public or searchable sources, using personal information for authentication is still a common tactic in 2017. I cringe when merchants use these types of questions to authenticate customers.

Fraudsters maintain active databases to store these elements and anyone with an account on the Dark Web can search for identifying information concerning the intended target. In fact, a neologism already exists for this phenomenon, "credential stuffing." The act of intercepting and using as many authentication elements as possible to construct a target profile and take over an account is an established process, built on archives of already compromised data.

In a world where emerging technologies are transforming protocols and workflows across the entire economy, businesses are missing a valuable opportunity to establish a more rigid authentication process, one that uses dynamic, original, and more sophisticated tactics to validate who  a person is. 

The rise of biometrics in remote and mobile app settings (retina scans, face and voice recognition, fingerprints, etc.), dynamic account-based questions with answers known only to the service provider and customer, and multifactor out-of-band authentication provided via a separate network are just three alternatives that can be embraced in tandem for a smoother authentication experience that simultaneously reduces the potential for account takeover. Would I feel more secure in a world of high-frequency data breaches knowing my financial institution authenticates me with at least two factors? Could this be faster than the present authentication practice of asking multiple questions throughout a contact center session? The answer to both questions is yes.

A formal overhaul of payments authentication is already underway in some regions. As European institutions prepare for PSD2 and its residual impact on digital commerce and cross-border payments, the Strong Consumer Authentication standards within this mandate have created a potential benchmark for secure authentication in the enterprise. With Stratistics MRC estimating that the global multifactor authentication market will grow to $13.59 billion by 2022, we're procuring new security mechanisms that will tap into a range of interchangeable knowledge, possession, and inherence-based identifiers. 

Organizations in the US must follow suit in their network and data protection methods. Establishing proactive monitoring processes and preparing an incident response plan in advance can reduce the flow of sensitive data leaving a business. Taking steps to encrypt the data itself is another means of ensuring that hackers don't have free rein over data, and the well-being of an organization's reputation once they've bypassed peripheral security solutions.

While no one wants to receive a somber letter from their financial institution, or look themselves up on a newly created security webpage to determine the status of their security following a breach, this is the new reality we live in. To sit idly by and continue authenticating with the most consistent static data elements is a lesson of any breach du jour. 

Related Content:

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Seth Ruden is a senior fraud consultant at ACI Worldwide with more than a decade of direct experience in financial services. As a certified fraud examiner and anti-money laundering specialist, Seth has worked with banks, law enforcement, regulators and analysts across the US, ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
5 Reasons the Cybersecurity Labor Shortfall Won't End Soon
Steve Morgan, Founder & CEO, Cybersecurity Ventures,  12/11/2017
BlueBorne Attack Highlights Flaws in Linux, IoT Security
Kelly Sheridan, Associate Editor, Dark Reading,  12/14/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security: 2017
A look at the biggest news stories (so far) of 2017 that shaped the cybersecurity landscape -- from Russian hacking, ransomware's coming-out party, and voting machine vulnerabilities to the massive data breach of credit-monitoring firm Equifax.
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.