Settings

Theme

Be warned, there's a nasty Google 2 factor auth attack going around

twitter.com

142 points by maccman 10 years ago · 60 comments

Reader

ams6110 10 years ago

So the scam is, attacker knows your gmail address and your phone number. They send you the text message about suspicous activity on your account. Then they attempt to reset the password on your gmail account. That triggers Google to send you the code. You reply to the attacker's message with the code as instructed, and they own your account.

  • stephengillie 10 years ago

    Again, this is a social engineering attack. 2-factor remains mathematically secure.

    • untog 10 years ago

      Sure, but implementation matters. I've long thought that 2 factor via SMS is a sub-optimal solution because it trains you to expect secure login info from a random shortcode SMS number.

    • fragsworth 10 years ago

      It doesn't sound like "2-factor" if all they need is the single code on your phone.

      • etherealmachine 10 years ago

        Account recovery is always a nagging weak spot. At some point, a user will forgot their password or lose their TFA device, and now you need them to be able to prove their identity outside of the usual flow. And if you have enough users, this has to be automated, leaving even more room for exploitation.

        • Alex3917 10 years ago

          > And if you have enough users, this has to be automated

          Not really, they could just charge people $100 to retrieve a lost password and then do it manually.

          • tetraodonpuffer 10 years ago

            I would love for services that I REALLY care about never ever ever being broken into (email, web hosting) there was ONLY the $100-and-speak-to-a-human option to change the password

            I would even make it $100 + skype and show live on skype your passport.

            • vilhelm_s 10 years ago

              "showing your passport on skype" seems insecure - I imagine it would not be very hard to paste a page with some computer-vision image registration barcodes on the photo page, and then hack up a video filter which pastes in an arbitrary bitmap.

          • ocdtrekkie 10 years ago

            Charging $100 is pretty punitive, but I've often wondered why more online services sensitive to attack don't use token credit card charges as a way to limit account duplication, increase complexity in a malicious operation, etc.

            Stealing credit cards is cheap, yes, but the additional cost to using such a card on a password reset would still be a deterrent.

            • quanticle 10 years ago

              The problem with charging people for password resets is that by making the process of resetting a password more expensive, you've now encouraged people to reuse passwords. People know when they sign up for your service that resetting a password is going to be expensive, so they'll use a password that they're sure not to forget, i.e. the password they use for everything else.

              I would posit that even with this social engineering exploit, Google's two-factor SMS authentication is still more secure than charging people for password recoveries (and thus encouraging password reuse).

            • _delirium 10 years ago

              I seem to recall there were some services that charged a one-time small fee in the late-90s / early-2000s basically for that reason. But in the past 10 years most seem to have moved to requiring a mobile phone number as the hurdle instead. The idea is that it has some of the same deterrent effect for bad actors, since coming up with a steady stream of unused mobile numbers costs a nonzero amount, but produces less sign-up friction for legitimate users.

            • bredman 10 years ago

              IMO it's not that bad, people are used to paying locksmiths that much when locked out of houses or vehicles.

            • Alex3917 10 years ago

              > Charging $100 is pretty punitive

              Not really, considering there is zero reason for anyone to ever lose a password assuming they are using a password manager. You could even make it free for the first few hours after the account is created or the password is changed in case the user pastes it into their password manager incorrectly.

              • copperx 10 years ago

                And how many "normal" people do you know that use a password manager? It's 0 for me. They don't even use post-it notes, which would be an improvement over "I'll just try to remember the password, and if I can't, I'll ask someone to help me ".

                • lgas 10 years ago

                  Assuming the "someone" is the forgot password feature and not a person, this seems like a sound approach. It's basically using the site itself as a slightly clunky password manager.

              • EpicEng 10 years ago

                >Not really, considering there is zero reason for anyone to ever lose a password assuming they are using a password manager

                Oh, so in other words; a tiny fraction of the internet using public?

          • TrevorJ 10 years ago

            And in the real world, no one would use that service. You aren't wrong though, that would be the way to do it if you wanted it to be secure.

          • marrone12 10 years ago

            That is a PR nightmare...

      • reitanqild 10 years ago

        I'd say it is two factor (googles implementation, the attack is classical social engineering): something you know (the password) and something you have (access to your phone).

        • _delirium 10 years ago

          In Google's implementation, only the "something you have" is really necessary for access. If you have the phone but not the password, you can just issue a password reset, which is confirmed via the phone, so the password doesn't function as a second factor independent of the phone.

          • maxander 10 years ago

            I wonder if anyone implements the restriction that a password reset can only be ordered after a certain time (a week, say) since the last successful password entry, for long-established accounts. Most real password resets are likely either in long-dormant or recently-created accounts, and this would add just another layer of partial protection against these kinds of attacks.

          • copperx 10 years ago

            Whoa. I hadn't realized this. So someone that knows my email address and has my phone has access to my entire life, because all password resets use my email address.

            If it's come to this, to using "something you have", then we can all go back to using paper password notebooks. They offer the same security, surprisingly.

            • NeutronBoy 10 years ago

              That's a bit extreme. You could just put a passcode on your phone?

              • kofejnik 10 years ago

                There have been many attacks in Russia where attackers would get a duplicate sim card from the operator (either with a bribe or a forged passport) and then proceed to hack everything linked to it - gmail, banks, facebook, etc

                • NeutronBoy 10 years ago

                  At that point (identify fraud) there's very little you can do short of not allowing password resets. Even if you have a human customer support rep to verify your identity prior to resetting a password, you can just send your forged identity documents.

                  • Corrado 10 years ago

                    It think this is something that Google is working on. By capturing multiple "facts" about you a company can be fairly certain who is trying to access an account, apart from passwords and phones. For example, they can tell if you spend 99.9% of your life in one country and then suddenly request a password reset from another country. I'm sure there are lots of other minor indicators that are much more difficult to fake, but putting them all together they should be able to get a pretty good picture of who you truly are even without proper 2FA.

                  • kofejnik 10 years ago

                    Probably the only thing you can do is to have a separate secret email or phone only for account recovery, which are not linked to you in any way, or recovery codes printed out and stored in a secure location

    • jrockway 10 years ago

      Mathematically secure is totally meaningless. OTPs can be phished, and this attack is a great example of that.

      U2F is the fix for this.

    • wdr1 10 years ago

      Was anyone claiming otherwise?

  • bitL 10 years ago

    This sounds like an ancient Agora protocol interaction attack back in the beginning of e-commerce :-D

JohnTHaller 10 years ago

This isn't a 2 factor attack. It's a social engineering Google account password reset attack. The attacking party is resetting your Google password and asking you to provide the code Google sends your registered mobile number via text to them.

  • kjaftaedi 10 years ago

    It is a 2 factor attack in the sense that it reduces the two factors down to one.

    • sievebrain 10 years ago

      2 factor auth is not a defence against phishing. This is such a common misconception. All two-factor means is that someone with only your password cannot log in, or only your device.

      What's happening here is that Google accounts without 2-factor but with a phone recovery path set up are being "account recovered" by a bad guy. It's just plain old phishing.

    • oplav 10 years ago

      I don't think there were ever 2 steps in this account recovery flow. There seems to be only 1 step when initiating a account recovery: provide the code sent to your phone.

      A 2 factor recovery flow would be 1) verify an email that was sent to your recovery email address that triggers 2) this account recovery code sent to your phone.

    • parent5446 10 years ago

      It does not reduce the two factors down to one. You still need two factors (password and SMS code) to login. It's just that you're giving both of them to the attacker.

azinman2 10 years ago

I wonder if this is at all related to a phishing attempt that just got my mom and all her friends. It came in as a "docusign" email that looked reasonably legit (to an ordinary person) that just had one button to sign and review a document. Apparently they asked for email, email password, and phone number. I was surprised to learn about the phone number bit and how they'd use it. Something like this is probably how.

While I'd have thought entering your email password would have been red flag galore, my mom and her friends were all exploited by the social trust aspect "I figured if it was coming from you it would be real."

  • Sephr 10 years ago

    > "I figured if it was coming from you it would be real."

    You should set up a strict DMARC policy (p=reject) to prevent people from spoofing your email address. It appears that you have not[1].

    Additionally, you should harden your SPF record: change ~all to -all.

    [1]: https://dmarcian.com/record-tools/azinman.com

    • azinman2 10 years ago

      It's not a spoof when you're phished and hand over your credentials.

      It also was my mom that was phished, not me.

      • Sephr 10 years ago

        Sorry, I don't think you understand.

        I'm saying that people cannot send emails to your mother pretending to be you if you were to implement the changes I have suggested.

        I didn't say you were phished, I said you were spoofed. Judging by your first comment, your email address being spoofed is how your mother was phished.

        • azinman2 10 years ago

          I do understand :) Perhaps my first comment was not clear. She never received anything from me. I'm not involved at all. It was her friend that got originally phished, which then sent a legitimate email (from an SPF record perspective) to her, which then phished her credentials, and so forth.

  • imglorp 10 years ago

    I just saw one of those. It's especially convincing when they target realtors' address books, because everyone in a real estate transaction is expecting a bunch of docusign links to be flying around from their realtor and their title company. So if something doesn't look kosher, they attribute it to a clunky process and hand over their login.

    • twoodfin 10 years ago

      This is exactly how my parents were phished. Interesting to hear it likely wasn't a coincidence that it came from their realtor.

      I subsequently set them up with two factor almost everywhere, but I'd give at least even odds they'd fall for this, too. Sigh.

yborg 10 years ago

Clever. If you've never actually had 2FA trigger before to know how it works, you could fall for this.

tjohns 10 years ago

This is one of nice things about using a hardware security key (FIDO U2F), like Yubikey.

Since the security key works with the browser to ensure its communicating directly with a specific site, you can't MITM them like you can mobile app (TOTP) or SMS-based two-factor codes.

I wish more browsers would add support for them.

libeclipse 10 years ago

This "attack" could be semi-mitigated by using Authy or Google Authenticator instead of SMS. If users knew to never ever paste the generated codes anywhere but the site, this attack wouldn't exist at all.

tehwebguy 10 years ago

A friend is currently receiving spear phishing attempts via text. Claims their lost iPhone has been found and that they need to log into icloud10 . com

koolba 10 years ago

While you're add it, verify that your password has not been hacked by entering it here: hxxp://evil.example.com/password-checker

fragsworth 10 years ago

How can this possibly work?

Even if an attacker gets the phone code, they should still need your password to sign in. How do they get past that?

  • kinofcain 10 years ago

    As ams6110 noted, it's likely not a 2-factor auth attack but rather a password reset attack.

jschwartzi 10 years ago

I guess I'm going to go set all my security question answers to random 64-byte strings that are base-64 encoded.

  • chris_wot 10 years ago

    Don't forget to apply a ROT-13 encoding afterwards, that should make it super secure.

    • technofiend 10 years ago

      I'm doubly secure with ROT-13 applied twice! ROT-26 (Patent Pending). Don't leave home without it.

      • chris_wot 10 years ago

        The nice thing about applying ROT-13 twice is that it greatly reduces decoding time.

Keyboard Shortcuts

j
Next item
k
Previous item
o / Enter
Open selected item
?
Show this help
Esc
Close modal / clear selection