Posted by:
admin
11 years, 7 months ago
After any high-profile account take-over there is always a call for two-factor authentication. At the same time there are always people yelling that two-factor authentication won't stop a determined attacker. The latest take-over was the APs Twitter account. Queue articles stating that we need two-factor authentication for National Security! Queue this one on how attackers can get around two-factor thanks to other vulnerabilities. How about some data?
First, let's start the DBIR , conveniently released this week by Verizon, As stated in the DBIR:
If data could start a riot (“Occupy Passwords!”), we could use these statistics to overthrow single-factor passwords: the supreme ruler in the world of authentication. If we could collectively accept a suitable replacement, it would’ve forced about 80% of these attacks to adapt or die.
As I pointed out on Twitter, two-factor authentication may not stop *an attack*, but it sure reduces your total number of successful attacks. The Verizon team - and more importantly - their data - would seem to agree. (I would also argue that in the case of the AP attack, it would have stopped it as I think it was an opportunistic attack. There are a number of news outlets on Twitter to target and more may have been targeted.)
We have another data point from Google. They have stated that account hijacks are down 99.7% from their peak. They accomplished this by implementing two-factor authentication (voluntarily for their users) and by performing risk analysis on suspicious authentication. I would love to have more data from them. For example, how many 'high-value' or likely targets adopted two-factor authentication? Note that this drop occurred while a known vulnerability existed against their 2FA system.
Twitter is now an important service and if it wants to play with the big boys, it will need to implement account protections. Twitter needs the APs and CNNs to be on Twitter and for them to be trusted.
They face some interesting issues around authorization, though. The big marketing brands and news agencies most likely have multiple users and some outsource their account entirely. One of our customers, Silverpop, faced just this issue. They solved it by implementing two-factor authentication along with a sophisticated authorization application that supports ad firms as well as direct customers. I expect that this type of system will be required by all sorts of services. Additionally, Twitter may have a harder time monitoring accounts for suspicious activity due to the large number of Twitter clients (none of which seem very good at just doing Twitter) and services such as Hootsuite that do their own authentication.
I disagree with the Verizon team that we need to collectively agree on a replacement. The more concentrated the market share in one solution, the more risk.
Share on Twitter Share on FacebookRecent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)