Android Century
  • Home
  • Android Zone
    • Android Apps
    • Android Games
    • Apps APk Files
    • Games Apk Files
    • Apps Hack Tricks
  • Reviews
  • Fantasy Zone
    • Entertainment
    • Quotes and Status
    • Life Style
    • Home Made Tips
    • Hair Care
    • Skin Care
    • Fantasy Tips
  • Tricks
    • Free Recharge
    • Free Internet
    • shopping Cashback
    • Recharge Cashback
  • Tech
  • Mobiles
  • Gadgets
  • News
  • How To's
  • Software
Breaking
Loading...

Featured post

How to Take Great Photos With Apple's iPhone X

Recent Posts

Labels

  • Android Apk Files
  • Android Apps
  • Android Games
  • Apps Apk Files
  • Entertainment
  • Fantasy Tips
  • Gadgets
  • Hair Care
  • HomeMade Tips
  • How To's
  • News
  • Quotes
  • Quotes & Status
  • Recharge Cashback
  • Recharge Promo Codes
  • Shopping Cashback
  • Technology
  • skin care
Home / How To's / Here’s How an Attacker Can Bypass Your Two-Factor Authentication

Here’s How an Attacker Can Bypass Your Two-Factor Authentication

Unknown 17:15:00 How To's Edit
Portrait of a teleoperator
Two-factor authentication systems aren’t as foolproof as they seem. An attacker doesn’t actually need your physical authentication token if they can trick your phone company or the secure service itself into letting them in.
Additional authentication is always helpful. Although nothing offers that perfect security we all want, using two-factor authentication puts up more obstacles to attackers who want your stuff.

Your Phone Company is a Weak Link

This all sounds fine. You have your cell phone, and it has a phone number. It has a physical SIM card inside it that ties it to that phone number with your cell phone provider. It all seems very physical. But, sadly, your phone number isn’t as secure as you think.The two-step authentication systems on many websites work by sending a message to your phone via SMS when someone tries to log in. Even if you use a dedicated app on your phone to generate codes, there’s a good chance your service of choice offers to let people log in by sending an SMS code to your phone. Or, the service may allow you to remove the two-factor authentication protection from your account after confirming you have access to a phone number you configured as a recovery phone number.
If you’ve ever needed to move an existing phone number to a new SIM card after losing your phone or just getting a new one, you’ll know what you can often do it entirely over the phone — or perhaps even online. All an attacker has to do is call your cell phone company’s customer service department and pretend to be you. They’ll need to know what your phone number is and know some personal details about you. These are the kinds of details — for example, credit card number, last four digits of an SSN, and others — that regularly leak in big databases and are used for identity theft. The attacker can try to get your phone number moved to their phone.
There are even easier ways. Or, For example, they can get call forwarding set up on the phone company’s end so that incoming voice calls are forwarded to their phone and don’t reach yours.
Heck, an attacker might not need access to your full phone number. They could gain access to your voice mail, try to log in to websites at 3 a.m., and then grab the verification codes from your voice mailbox. How secure is your phone company’s voice mail system, exactly? How secure is your voice mail PIN — have you even set one? Not everyone has! And, if you have, how much effort would it take for an attacker to get your voice mail PIN reset by calling your phone company?

With Your Phone Number, It’s All Over

This is a problem for practically every service. Online services don’t want people to lose access to their accounts, so they generally allow you to bypass and remove that two-factor authentication with your phone number. This helps if you’ve had to reset your phone or get a new one and you’ve lost your two-factor authentication codes — but you still have your phone number.Your phone number becomes the weak link, allowing your attacker to remove two-step verification from your account — or receive two-step verification codes — via SMS or voice calls. By the time you realize something is wrong, they can have access to those accounts.
Theoretically, there’s supposed to be a lot of protection here. In reality, you’re dealing with the customer service people at cellular service providers. These systems are often set up for efficiency, and a customer service employee may overlook some of the safeguards faced with a customer who seems angry, impatient, and has what seems like enough information. Your phone company and its customer service department are a weak link in your security.
Protecting your phone number is hard. Realistically, cellular phone companies should provide more safeguards to make this less risky. In reality, you probably want to do something on your own instead of waiting for big corporations to fix their customer service procedures. Some services may allow you to disable recovery or reset via phone numbers and warn against it profusely — but, if it’s a mission-critical system, you may want to choose more secure reset procedures like reset codes you can lock in a bank vault in case you ever need them.

Other Reset Procedures


Try it yourself — go to the service you’ve secured with two-factor authentication and pretend you’ve lost the code. See what it takes to get in. You may have to provide personal details or answer insecure “security questions” in the worst case scenario. It depends on how the service is configured. You may be able to reset it by emailing a link to another email account, in which case that email account may become a weak link. In an ideal situation, you may just need access to a phone number or recovery codes — and, as we’ve seen, the phone number part is a weak link.It’s not just about your phone number, either. Many services allow you to remove that two-factor authentication in other ways if you claim you’ve lost the code and need to log in. As long as you know enough personal details about the account, you may be able to get in.
Here’s something else scary: It’s not just about bypassing two-step verification. An attacker could try similar tricks to bypass your password entirely. This can work because online services want to ensure people can regain access to their accounts, even if they lose their passwords.
For example, take a look at the Google Account Recovery system. This is a last-ditch option for recovering your account. If you claim to not know any passwords, you’ll eventually be asked for information about your account like when you created it and who you frequently email. An attacker who knows enough about you could theoretically use password-reset procedures like these to get access to your accounts.
We’ve never heard of Google’s Account Recovery process being abused, but Google isn’t the only company with tools like this. They can’t all be entirely foolproof, especially if an attacker knows enough about you.

Whatever the problems, an account with two-step verification set up will always be more secure than the same account without two-step verification. But two-factor authentication is no silver bullet, as we’ve seen with attacks that abuse the biggest weak link: your phone company.
Share on Facebook Share on Twitter Share on Google Plus

RELATED POSTS


How to Sync Your Contacts Between A...

How to Know a Wi-Fi Network Is Fast...

How to delete your Google search hi...
Here’s How an Attacker Can Bypass Your Two-Factor Authentication Here’s How an Attacker Can Bypass Your Two-Factor Authentication Reviewed by Unknown on 17:15:00 Rating: 5

0 comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments ( Atom )

Search This Blog

TEST BOOK FOR GOVT ENTRANCE TEST

TEST BOOK FOR GOVT ENTRANCE TEST
Find All Latest book for preparation of SSC,RAILWAYBANK PO,RBI,BANK CLERK,GATE ME,GATE CE are available here in less prices, to check out the books click here

Translate

  • Popular Post
  • Random posts
  • Category

Popular Posts

  • Teen Patti Offer 2018: Refer and Earn Flipkart Vouchers Free
    Teen Patti Offer 2018: Refer and Earn Flipkart Vouchers Free
    Teen Patti Refer & Earn Offer:  Hey Guys! Today I make an article about Teen Patti Referral ...
  • Hands-on with the home windows 10 Creators update for the Xbox One: Beam recreation streaming arrives
    The Windows 10 Creators Update is here, now—yes,  now —but not (officially) on the PC. The ...
  • Taotronics TT-BH22 Headphones Review
    We make it a addiction to now not look up pricing of a product sooner than reviewing and if ...
  • Pentagon strongly condemns North Korea missile test
    The Pentagon on Monday strongly condemned North Korea’s latest missile test, adding that the ...
  • Bank wallets growing faster than e-wallets
    In the  bank  versus  e-wallets  sweepstakes,  lenders  have now gained lost ground. As of ...
  • Reliance Jio to offer sharp tariff discounts for customers signing up by March-end
    Reliance Industries' Jio unit will charge a tariff for its services from April, but will offer ...

Random Posts

  • Step by step to Install WordPress on Bluehost Hosting
    Step by step to Install WordPress on Bluehost Hosting
    03.04.2017 - 0 Comments
    New bloggers still don’t have a clue whether to go for Blogger or Self-hosted WordPress to start a new…
  • 10 robots that are changing the world
    10 robots that are changing the world
    12.02.2017 - 0 Comments
    Whether they’re taking our jobs, acting as our own personal butlers or planning mankind’s ultimate…
  • Best free iPad apps 2017 (itunes)
    Best free iPad apps 2017 (itunes)
    13.02.2017 - 0 Comments
    OK - you've probably noticed on the Apple App Store that iPad apps cost more -…
  • How Sony beat Nintendo and Sega at their own game
    How Sony beat Nintendo and Sega at their own game
    07.03.2017 - 0 Comments
    It might be hard to believe it now, but there was a time when Sony was something of a laughing stock…
  • How to Wow Your Partner on Valentine’s Day
    How to Wow Your Partner on Valentine’s Day
    12.01.2017 - 0 Comments
    Valentine’s Day is wonderful. It’s literally a celebration of Love. Yes, Love should be celebrated every…

Labels

Android Apk Files Android Apps Android Games Apps Apk Files Apps Hack Tricks Entertainment Free Internet Freecharge Gadgets Games Apk Files How To's Laptops Guide Mobiles Reviews Technology Viral's android zone free recharge

Entertainment

Tricks

Popular Posts

  • Teen Patti Offer 2018: Refer and Earn Flipkart Vouchers Free
    Teen Patti Offer 2018: Refer and Earn Flipkart Vouchers Free
    Teen Patti Refer & ...
  • Steam Now Supports PS4's DualShock 4 Controller
    HIGHLIGHTS ...
  • Lenovo Yoga Book launched in India at Rs 49,990: First Impressions
    Lenovo  has ...
  • This $15 stand turns your Apple Watch into a mini Macintosh
    For all those  ...
  • Grow Hair Faster: How to Make Hair Grow Faster Naturally
    Every woman wants ...
  • MobiKwik - Update E-KYC & Get Rs. 100 Supercash
    MobiKwik - Update E-KYC & Get Rs. 100 Supercash
    Mobikwik - Update ...
  • Fitbit Flex 2017 review
    Fitbit PROS ...

Random Posts

  • How to Change the Unit of Measurement in LibreOffice Writer
    How to Change the Unit of Measurement in LibreOffice Writer
    19.02.2017 - 0 Comments
    LibreOffice Writer allows you to measure your margins, tabs, etc. in several different sets of units,…
  • President Trump’s national security adviser Michael Flynn trying to survive crisis
    President Trump’s national security adviser Michael Flynn trying to survive crisis
    14.02.2017 - 0 Comments
    Retired Lt. Gen and current US national security adviser Michael Flynn walks through the lobby at Trump…
  • The best add-ons for the Kodi media player and how to install them
    The best add-ons for the Kodi media player and how to install them
    11.03.2017 - 0 Comments
    Kodi, the versatile open source media player has a lot of hidden talents thanks to its huge…
  • Foxconn to use  unit's Shanghai IPO to fund $4 billion projects
    Foxconn to use unit's Shanghai IPO to fund $4 billion projects
    13.02.2018 - 0 Comments
    HONG KONG: Taiwan's Foxconn, the world's largest contract electronics manufacturer, said it plans to use…
  • Reliance Jio blames Airtel for most call drops
    Reliance Jio blames Airtel for most call drops
    16.01.2017 - 0 Comments
    Reliance Jio added that the resultant call failure rates continue to be of the order of 175 calls failing…

Most Popular

  • Teen Patti Offer 2018: Refer and Earn Flipkart Vouchers Free
    Teen Patti Offer 2018: Refer and Earn Flipkart Vouchers Free
    Teen Patti Refer & ...
  • SAMSUNG GALAXY J7 (2016) REVIEWS
    SAMSUNG GALAXY J7 (2016) REVIEWS
    SAMSUNG GALAXY J ...
  • Top 5 Best SmartPhones under 7000 Rs (March 2017)
    Looking for the ...
  • Apple, IBM, Cisco are huge because of Indians, do not deny them H-1B visa: RBI Governor Urjit Patel
    ...
  • SAMSUNG GALAXY J7 (2016) Specifications
    SAMSUNG GALAXY J ...
  • BlackBerry Teases Marshmallow Beta Testing for Priv by Next Week
    Blackberry ...
  • LG Q6 Review
    LG Q6 Review
    2017 is ...

Contact Form

Name

Email *

Message *

Offers Zone

Created By Android Century Distributed by Android Century
  • Home
  • About us
  • Contact us
  • Privacy policy
  • Terms of use
  • Advertise here
Subscribe Via Email Subscribe To Android Century By Email And Get Free Updates. ;-)


Your email address is safe with us!