{"id":14383,"date":"2019-01-21T09:10:06","date_gmt":"2019-01-21T17:10:06","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/01\/21\/news-8135\/"},"modified":"2019-01-21T09:10:06","modified_gmt":"2019-01-21T17:10:06","slug":"news-8135","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2019\/01\/21\/news-8135\/","title":{"rendered":"Has two-factor authentication been defeated? A spotlight on 2FA\u2019s latest challenge"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 21 Jan 2019 16:15:30 +0000<\/strong><\/p>\n<p>Multiple news reports about the defeat of two-factor authentication (2FA) have been making rounds lately.<\/p>\n<p>In November 2018, our friends at ESET <a href=\"https:\/\/www.welivesecurity.com\/2018\/12\/11\/android-trojan-steals-money-paypal-accounts-2fa\/\" target=\"_blank\" rel=\"noopener\">discovered a purported Android battery utility tool<\/a> called \u201cOptimization Android\u201d from a third-party app store. This app was designed to steal money from a user\u2019s PayPal account without relying on stolen credentials. It operates by modifying a device\u2019s Accessibility settings and enabling the use of Android\u2019s overlay accessibility feature. This then allows a malicious accessibility service to mimic the user\u2019s clicks to access the legitimate app and wire money to the criminal\u2019s own PayPal address.<\/p>\n<p>Long story short: This method effectively bypasses <a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/01\/understanding-the-basics-of-two-factor-authentication\/\" target=\"_blank\" rel=\"noopener\">2FA<\/a>.<\/p>\n<p>Then in mid-December, researchers at the <a href=\"https:\/\/certfa.com\/\" target=\"_blank\" rel=\"noopener\">Computer Emergency Response Team in Farsi (CERTFA)<\/a> Lab <a href=\"https:\/\/blog.certfa.com\/posts\/the-return-of-the-charming-kitten\/\" target=\"_blank\" rel=\"noopener\">released a report<\/a> about \u201cThe Return of Charming Kitten,\u201d a fresh slew of state-backed phishing attacks on individuals involved in sanctions against Iran and others, but focusing more on people based in the United States and Israel. State actors have found a way to fool targets into giving away their Gmail and Yahoo! 2-step verification codes.<\/p>\n<p>Days after CERTFA\u2019s report, Amnesty International <a href=\"https:\/\/www.amnesty.org\/en\/latest\/research\/2018\/12\/when-best-practice-is-not-good-enough\/\" target=\"_blank\" rel=\"noopener\">broke the news<\/a> that broad, targeted phishing campaigns were set against thousands of human rights defenders (HRDs), journalists, and political actors in countries throughout the Middle East and Northern Africa (MENA). The threat actors behind at least one campaign had also actively and deliberately taken steps to bypass common forms of 2FA.<\/p>\n<h3>A mantis lies in wait<\/h3>\n<p>The latest means to circumvent 2FA was made public by Polish security researcher Piotr Duszy\u0144ski not long after the New Year. He called it <a href=\"https:\/\/github.com\/drk1wi\/Modlishka\" target=\"_blank\" rel=\"noopener\">Modlishka<\/a>\u2014the English pronunciation of the Polish word \u2018mantis\u2019\u2014and described it as \u201ca flexible and powerful <a href=\"https:\/\/www.techopedia.com\/definition\/16048\/reverse-proxy-server\" target=\"_blank\" rel=\"noopener\">reverse proxy<\/a>\u00a0that will take your phishing campaigns to the next level (with minimal effort required from your side).\u201d It was a tool to aid penetration testers in conducting legitimate\u00a0tests.<\/p>\n<p>With its release, Duszy\u0144ski <a href=\"https:\/\/blog.duszynski.eu\/phishing-ng-bypassing-2fa-with-modlishka\/\" target=\"_blank\" rel=\"noopener\">emphasized<\/a> the effectiveness and seriousness of <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/08\/social-engineering-attacks-what-makes-you-susceptible\/\" target=\"_blank\" rel=\"noopener\">social engineering attacks<\/a>. In the wrong hands, a tool like Modlishka can be misused to create a compelling and sophisticated phishing campaign that is significantly easier to use but far more difficult to detect and avoid by users.<\/p>\n<div id=\"attachment_26893\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"26893\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/01\/two-factor-authentication-defeated-spotlight-2fas-latest-challenge\/attachment\/modlishka-github-drk1wi\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/modlishka-github-drk1wi.png\" data-orig-size=\"900,215\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"modlishka-github-drk1wi\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/modlishka-github-drk1wi-300x72.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/modlishka-github-drk1wi-600x143.png\" class=\"wp-image-26893 size-large\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/modlishka-github-drk1wi-600x143.png\" alt=\"\" width=\"600\" height=\"143\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/modlishka-github-drk1wi-600x143.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/modlishka-github-drk1wi-300x72.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/modlishka-github-drk1wi.png 900w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p class=\"wp-caption-text\"><em>Overview of collected information from a simulated phishing campaign (Courtesy of Piotr Duszy\u0144ski)<\/em><\/p>\n<\/div>\n<h3>How Modlishka works<\/h3>\n<p>Modlishka sits between the legitimate website it is impersonating and the phishing website the user is seeing.<\/p>\n<p>For this tool to successfully do its job\u2014and, in turn, for the campaign to work\u2014phishing campaign operators must first make their targets believe that they are on the website they expect to be on so that victims will enter their credentials without suspicion. Any interactions the user makes within the phishing page, including entering credentials, are passed through and recorded by Modlishka first before forwarding them to the legitimate website in real time.<\/p>\n<p>This tool also prompts the user for tokens when their accounts have 2FA enabled. However, the phisher should be present to intercept the 2FA token\u2014especially if it\u2019s a <a href=\"https:\/\/en.wikipedia.org\/wiki\/Time-based_One-time_Password_algorithm\" target=\"_blank\" rel=\"noopener\">time-based, one-time password (TOTP)<\/a>\u2014from the user and manually input it to the legitimate website themselves before it expires.<\/p>\n<p>Assuming everything went smoothly, the user is then redirected to the legitimate website and successfully logged in to conclude the phishing attack. Below is a video of Modlishka in action.<\/p>\n<div class=\"embed-vimeo\" style=\"text-align: center;\"><iframe loading=\"lazy\"  src=\"https:\/\/player.vimeo.com\/video\/308709275\" width=\"100%\" height=\"420\" frameborder=\"0\" ><\/iframe> <\/div>\n<p style=\"text-align: center;\"><em>Courtesy of Piotr Duszy\u0144ski<\/em><\/p>\n<h3>How users can protect themselves<\/h3>\n<p>To stop Modlishka dead in its tracks, Duszy\u0144ski advised the use of 2FA hardware tokens, such as Yubikey, RSA SecurID, and the Titan Security Key, that support the <a href=\"https:\/\/fidoalliance.org\/specs\/fido-u2f-v1.0-ps-20141009\/fido-u2f-overview-ps-20141009.html\" target=\"_blank\" rel=\"noopener\">Universal 2<sup>nd<\/sup> Factor (U2F) standard<\/a>. According to Matias Brutti, Director of Research and Exploitation at Okta, <a href=\"https:\/\/www.okta.com\/security-blog\/2019\/01\/investigating-modlishka-credential-attacks-old-dog-new-tricks\/\" target=\"_blank\" rel=\"noopener\">Push authentication<\/a>\u00a0can also render such campaigns less effective.<\/p>\n<p>Since all the incidents we mentioned here are all phishing attempts, it <em>still<\/em> pays to <a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/06\/somethings-phishy-how-to-detect-phishing-attempts\/\" target=\"_blank\" rel=\"noopener\">know what to look out for<\/a> when determining whether a website, email, text, or other communication is a phish. Never click unknown links without verifying their authenticity first. Always check the URLs in the address bar\u2014and remember, <a href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/05\/https-why-the-green-padlock-is-not-enough\/\" target=\"_blank\" rel=\"noopener\">the green padlock is no longer enough<\/a> to identify whether a site is safe or not.<\/p>\n<p>Furthermore, users might drop the use of SMS 2FA and opt for a stronger second form of authentication, such as an authentication app or <a href=\"https:\/\/blog.malwarebytes.com\/glossary\/biometrics\/\" target=\"_blank\" rel=\"noopener\">biometrics<\/a>. Make it a point to regularly review account access logs to check if someone other than yourself is attempting to gain entry to your online accounts. Avoid conducting business, especially that involving the exchange of sensitive information or documents, using your personal email. And if you can, put additional encryption in your messages by using <a href=\"https:\/\/blog.malwarebytes.com\/101\/2013\/07\/how-to-encrypt-your-email\/\" target=\"_blank\" rel=\"noopener\">Pretty Good Privacy (PGP)<\/a>. Lastly, <a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/05\/dont-need-27-different-passwords\/\" target=\"_blank\" rel=\"noopener\">use password managers<\/a>\u2014they not only have better memories than their humans, but they also keep you away from phishing sites by checking the URLs on the address bar before auto-populating fields.<\/p>\n<p>For mobile users, avoid downloading apps from third-party stores. Better yet, avoid looking for app utilities you think will optimize your mobile device. For example, if you&#8217;re looking to <a href=\"https:\/\/qz.com\/1042342\/how-can-i-make-my-mobile-phone-battery-last-longer\/\" target=\"_blank\" rel=\"noopener\">extend battery life<\/a>, don&#8217;t download an app. Adopt some simple steps, such as turning off GPS when you&#8217;re not using it, or using the phone in battery-saver mode.<\/p>\n<h3>2FA is still good to have<\/h3>\n<p>Adopting 2FA is well-known, popular cybersecurity advice we give to those who want to beef up the security\u2014and consequently, the privacy\u2014of their accounts. But it\u2019s also a known fact that 2FA is not bulletproof, hack-proof, or the cybersecurity panacea many assume it to be.<\/p>\n<p>It is true that some forms, such as SMS-based OPTs, are a lot easier to circumvent than others. It is also true that there are <a href=\"https:\/\/vimeo.com\/306182798\" data-rel=\"lightbox-video-0\" target=\"_blank\" rel=\"noopener\">more than 10 known ways to defeat 2FA<\/a> to date. However, this doesn\u2019t mean that 2FA itself is broken. Using 2FA is still far better than having just a user name and password locking your account.<\/p>\n<p>The defeat of certain forms of 2FA isn\u2019t a call for total abandonment nor should it be considered as one. It signals us, the users, to explore and go for better, more advanced forms of 2FA in securing our accounts. It also forces us to re-think our habits, adapt accordingly to this change in the threat landscape, and continue to learn about the latest social engineering tactics and tricks that could target us in the environments and sites we frequent.<\/p>\n<p>Stay safe!<\/p>\n<p>Additional reading:<\/p>\n<ul>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/12\/something-else-phishy-detect-phishing-attempts-mobile\/\" target=\"_blank\" rel=\"noopener\">Something else is phishy: How to detect phishing attempts on mobile<\/a><\/li>\n<\/ul>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/01\/two-factor-authentication-defeated-spotlight-2fas-latest-challenge\/\">Has two-factor authentication been defeated? A spotlight on 2FA\u2019s latest challenge<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/01\/two-factor-authentication-defeated-spotlight-2fas-latest-challenge\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 21 Jan 2019 16:15:30 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/01\/two-factor-authentication-defeated-spotlight-2fas-latest-challenge\/' title='Has two-factor authentication been defeated? A spotlight on 2FA\u2019s latest challenge'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/shutterstock_708139084.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>While many tech-savvy folks are familiar with two-factor authentication (2FA), more are unaware that there are several ways around it. A tactic called Modlishka, the English pronunciation for the Polish word for &#8220;mantis,&#8221; is the latest in this list.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/social-engineering-cybercrime\/\" rel=\"category tag\">Social engineering<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/2fa\/\" rel=\"tag\">2fa<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/2fa-modlishka\/\" rel=\"tag\">2FA modlishka<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/amnesty-international\/\" rel=\"tag\">Amnesty International<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/certfa\/\" rel=\"tag\">CERTFA<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/defeat-2fa\/\" rel=\"tag\">defeat 2FA<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mantis\/\" rel=\"tag\">mantis<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/modlishka\/\" rel=\"tag\">modlishka<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/password-manager\/\" rel=\"tag\">password manager<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/pgp\/\" rel=\"tag\">PGP<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/social-engineering\/\" rel=\"tag\">Social Engineering<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/the-return-of-charming-kitten\/\" rel=\"tag\">the return of charming kitten<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/totp\/\" rel=\"tag\">totp<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/two-factor-authentication\/\" rel=\"tag\">two-factor authentication<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/01\/two-factor-authentication-defeated-spotlight-2fas-latest-challenge\/' title='Has two-factor authentication been defeated? A spotlight on 2FA\u2019s latest challenge'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/01\/two-factor-authentication-defeated-spotlight-2fas-latest-challenge\/\">Has two-factor authentication been defeated? A spotlight on 2FA\u2019s latest challenge<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10598,20736,20737,20738,4503,20739,20740,20741,11347,13789,10510,20742,10605,10606],"class_list":["post-14383","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-2fa","tag-2fa-modlishka","tag-amnesty-international","tag-certfa","tag-cybercrime","tag-defeat-2fa","tag-mantis","tag-modlishka","tag-password-manager","tag-pgp","tag-social-engineering","tag-the-return-of-charming-kitten","tag-totp","tag-two-factor-authentication"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14383","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=14383"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14383\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=14383"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=14383"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=14383"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}