Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint //

Authentication

8/3/2018
09:00 AM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Is SMS 2FA Enough Login Protection?

Experts say Reddit breach offers a prime example of the risks of depending on one-time passwords sent via text.

The "serious attack" against Reddit, disclosed earlier this week, may have only resulted in a limited breach, but Reddit's engineering team and many experts in the security industry believe it should be a strong wake-up call for organizations to bolster their methods of two-factor authentication (2FA). 

According to Reddit's engineering staff, "we suspect weaknesses inherent to SMS-based 2FA to be the root cause of this incident," which exposed old user data and hashed credentials. In its announcement of the scope of the breach, the firm encouraged fellow security professionals to move to token-based authentication. 

That lesson was heard in a loud refrain from security pundits following Reddit's disclosure. 

"While lots of organizations think 2FA is a silver bullet for authentication, it actually isn’t, thanks to weaknesses in mobile networks that allow SMSes to be intercepted," says Leigh-Anne Galloway, cybersecurity resilience lead at Positive Technologies.

The way Reddit was breached is a common attack that takes advantage of unwarranted faith in SMS-based 2FA, she adds. "SMS alone is not enough to constitute adequate defense of customer and employee data," Galloway says. "Two-factor authentication that involves standalone hardware token generators is needed to mitigate the risk of such attacks."

The vulnerabilities of SMS one-time password (OTP) tokens to interception are hardly a secret, says Andy Smith, vice president of product marketing at Centrify. He sees another lesson here about how important it is for security and IT teams to stay abreast of the latest security standards. For example, he points to the fact that the National Institute of Standards and Technologies in its Special Publication 800-63 Guidelines recommends restricting the use of SMS for OTP and advises to completely remove OTP generation via email. 

"Instead, NIST is propagating the use of either application-enabled or hardware-based security keys that are leveraging the FIDO standard," he says.

In fact, hardware-based security keys utilizing FIDO's Universal Second Factor (U2F) standard have been gaining some very high-profile traction from big brands using them both for customers and employees. For example, in January Facebook extended support for U2F to customers that wanted to start protecting their accounts with more secure 2FA methods.

Meantime, just last month Google said it has managed to keep all of its 85,000-plus employees from being phished for over a year since it started making them use U2F-based security keys for logins. The program has been so successful that Google plans on rolling out its own branded security keys to Google Cloud corporate customers.

Nevertheless, some security evangelists believe that the industry shouldn't pile too much on SMS-based 2FA.

"In many cases, it's still better than nothing," says Ilia Kolochenko, CEO of High-Tech Bridge. "Moreover, when most of business-critical applications have serious vulnerabilities varying from injections to RCE, 2FA hardening is definitely not the most important task to take care of." 

SANS senior instructor Jake Williams agrees, stating in a Twitter post that "2FA hard token zealots" should tone it down.

"Stop discouraging orgs from implementing 'good-enough' security," he wrote.

Nevertheless, while SMS 2FA is indeed better than a password alone, it is important for organizations not to be lulled into a false sense of security using it, says Craig Young, computer security researcher for Tripwire's Vulnerability and Exposure Research Team (VERT).

"Although any form of multifactor authentication is a considerable improvement on simple password models, SMS-based verification tokens can be stolen with a variety of well-known techniques, including social engineering, mobile malware, or by directly intercepting and decrypting signals from cell towers," he says.

The interesting aspect of the Reddit breach, Young adds, is that it is not a financial institution, which traditionally is the target for these types of attacks.

Related Content:

 

 

 

Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
How Attackers Could Use Azure Apps to Sneak into Microsoft 365
Kelly Sheridan, Staff Editor, Dark Reading,  3/24/2020
Malicious USB Drive Hides Behind Gift Card Lure
Dark Reading Staff 3/27/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-10940
PUBLISHED: 2020-03-27
Local Privilege Escalation can occur in PHOENIX CONTACT PORTICO SERVER through 3.0.7 when installed to run as a service.
CVE-2020-10939
PUBLISHED: 2020-03-27
Insecure, default path permissions in PHOENIX CONTACT PC WORX SRT through 1.14 allow for local privilege escalation.
CVE-2020-6095
PUBLISHED: 2020-03-27
An exploitable denial of service vulnerability exists in the GstRTSPAuth functionality of GStreamer/gst-rtsp-server 1.14.5. A specially crafted RTSP setup request can cause a null pointer deference resulting in denial-of-service. An attacker can send a malicious packet to trigger this vulnerability.
CVE-2020-10817
PUBLISHED: 2020-03-27
The custom-searchable-data-entry-system (aka Custom Searchable Data Entry System) plugin through 1.7.1 for WordPress allows SQL Injection. NOTE: this product is discontinued.
CVE-2020-10952
PUBLISHED: 2020-03-27
GitLab EE/CE 8.11 through 12.9.1 allows blocked users to pull/push docker images.