Posted by:
admin
12 years, 11 months ago
SC Magazine's Australian edition recently published an article entitled $45k stolen in phone porting scam. This article was then rewritten on Help Net Security as "Fraudsters beat two-factor authentication, steal $45k"
The summation of the SC Magazine article:
Call your mobile phone provider on the phone numbers below and insist on additional security questions being added to your account before the number can be ported.
The last paragraph of the Help Net Security article, despite its inaccurate headline, gets closer to the true issue:
But, the bigger problem in all of this is the fact that Australian banks have been informed of the possibility of the "porting" option being misused to mount this kind of attack back in 2009, but a lot of them declined to implement a verification system that would make sure that the number to which they send the additional verification code has not been recently "ported".
The truth is that any use of SMS is a problem and not just because of porting. The list of dangers about the SMS system should be well known by now:
- Criminal pay top dollar for phones that can intercept SMS
- Flawed security lets Sprint account get easily hijacked
- Russian Mobile Operator Leaks Users’ SMS Histories
Carriers are not incented to secure their users accounts. If they increase the difficulty of resetting a password or performing some change, users will start calling support. If you have 100,000,000 users and an extra 2% start calling, it adds up fast. So SMS is really just an email sent to a phone over a provider that barely cares about security. 99% of SMS messages don't require security (and probably 99% of those don't even need to be sent, but that's another story), so don't expect the carriers to add any soon.
If some application warrants two-factor authentication, then it warrants even the most basic risk analysis. Would you start using an unencrypted VPN because it ran on a phone? If a bank outsourced it's VPN service, what types of audits would they do? What kinds of guarantees would they demand? Did the carriers agree to similar demands when financial institutions outsourced their authentication to them?
(I also posted this to Infosec Island.)
PS: If you are using or considering using SMS for authentication because you need the universal availability (ie no smart-phone required) and are concerned about the security implications, please contact us to discuss a new product.
Share on Twitter Share on FacebookRecent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)