Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


03:00 PM

'Man In The Mobile' Attacks Highlight Weaknesses In Out-Of-Band Authentication

New exploits circumvent efforts by banks, other businesses to verify users' identities via SMS text

Recent attacks that use the increasingly popular Zeus Trojan are demonstrating that widely used methods of out-of-band authentication might be flawed, experts say.

New attack techniques dubbed "Man in the Mobile" (MitMo) are allowing black hats to leverage malware placed on mobile devices to get around password verification systems that send codes via SMS text messages to users' phones for confirmation of identity.

"In a transaction verification system, the customer receives a text message with the transaction details and a code to enter back into the website -- only if the transaction details match the real transaction," explains Mickey Boodaei, CEO of Trusteer. "Transaction verification was considered a good solution to protect against [MitMo] attacks, where malware attempts to submit a transaction on behalf of the victim.

"However, MitMo completely bypasses this, as it controls the mobile device and can forward the verification text to the fraudsters and delete it from the device without letting the victim see it," Boodaei warns.

The expansion of Zeus' capabilities to carry out MitMo attacks is yet another step in the cat-and-mouse game that banking security professionals continue to play with hackers to ensure users are who they say they are.

"[Banks] will need to adjust to the reality that two-factor authentication will always be challenged by hackers. A compromised mobile phone is the same as a compromised PC," says Derek Manky, project manager for Fortinet's Cyber Security & Threat Research unit.

Banks need to find ways to educate users and help them secure their channels of authentication, Manky says. "End users may be aware of the fact that they can have their account information stolen from an infected PC and/or phishing attack, but likely won't think twice about mobile attacks at the moment," he warns.

While education is certainly an important component, Boodaei believes banks need to offer users a helping hand in securing those channels for authentication.

"Banks should use technologies to secure the communication between customers' computers and websites and between customers' mobile phones and websites," Boodaei says.

"This requires an additional layer of security on the computer and the mobile device, which can shield the communication and prevent malware from accessing financial data and login information," Boodaei continues. "Many banks, such as Santander, the Royal Bank of Scotland, HSBC, CIBC, SunTrust, and Fifth Third are already offering this extra layer of security."

Organizations might also need to think more closely about the type of out-of-band one-time-password technology they're using to boost authentication, experts say. For example, a system where the user directly replies to the SMS text through their phones -- rather than simply entering a code supplied by text back into the Web browser -- could be more secure. Or organizations could consider forgetting about texts altogether and choose to go with an old-fashioned phone call as the means for out-of-band verification.

"We're not aware of any attacks that defeat this mechanism," says Steve Dispensa, CTO and co-founder of PhoneFactor. "Because of the logical separation between voice and data functions on smartphones, phone calls are resistant to malware running on the phone."

Truly security-conscious organizations could even layer a further factor into that phone call if they choose to add voice biometrics checks into their verification calls. It's all a matter of priorities. As Dispensa puts it, even the types of out-of-band authentication that are vulnerable to these latest attacks are still more secure than many other classes of two-factor authentication that require less work to subvert.

"All token-based solutions, grid cards, etc., can be compromised through a single piece of malware," Dispensa observes. "New attacks, even in their most virulent forms, require two coordinated infections -- to the user's mobile phone and to their computer. This is substantially more difficult to achieve in practice."

"Legacy two-factor systems, such as security tokens, are fatally flawed and routinely compromised, since it only takes a single piece of malware to get around them," Dispensa cautions. "Out-of-band two-factor technology is the new best practice, and we expect to continue to see significant adoption. With 40-some percent of PCs infected with malware, using a phone for authentication is much more secure."

With more malware being spread to smartphones, however, this advantage might not last forever, experts say.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Zero-Factor Authentication: Owning Our Data
Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
44% of Security Threats Start in the Cloud
Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
Firms Improve Threat Detection but Face Increasingly Disruptive Attacks
Robert Lemos, Contributing Writer,  2/20/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-02-23
An issue was discovered in SmartClient 12.0. If an unauthenticated attacker makes a POST request to /tools/developerConsoleOperations.jsp or /isomorphic/IDACall with malformed XML data in the _transaction parameter, the server replies with a verbose error showing where the application resides (the a...
PUBLISHED: 2020-02-23
An issue was discovered in SmartClient 12.0. Unauthenticated exploitation of blind XXE can occur in the downloadWSDL feature by sending a POST request to /tools/developerConsoleOperations.jsp with a valid payload in the _transaction parameter.
PUBLISHED: 2020-02-23
An issue was discovered in SmartClient 12.0. The Remote Procedure Call (RPC) loadFile provided by the console functionality on the /tools/developerConsoleOperations.jsp (or /isomorphic/IDACall) URL is affected by unauthenticated Local File Inclusion via directory-traversal sequences in the elem XML ...
PUBLISHED: 2020-02-23
An issue was discovered in SmartClient 12.0. The Remote Procedure Call (RPC) saveFile provided by the console functionality on the /tools/developerConsoleOperations.jsp (or /isomorphic/IDACall) URL allows an unauthenticated attacker to overwrite files via vectors involving an XML comment and /.. pat...
PUBLISHED: 2020-02-23
danfruehauf NetworkManager-ssh before 1.2.11 allows privilege escalation because extra options are mishandled.