• Home
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
  • Events
  • Whitepapers
  • Newsletters
  • Sign in
  • Events
    • Follow V3 Events

      Sign up to receive email alerts about our events

      Sign up
  • Whitepapers
    • V3resources 120x194
      Network Security Forensics For GDPR Compliance

      An effective network security forensics strategy can assist an organization in providing key compliance-related details as part of any post-incident GDPR investigation.

      Download
      V3resources 120x194
      10 ways to increase productivity with managed Office 365

      For businesses large and small, relying on a cloud-based collaboration and productivity suite such as Microsoft Office 365 is becoming the norm. Enhancing productivity in your organisation is vital to get ahead in 2017 - and using Office 365 can help, if it's used right...

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • Data Strategy Spotlight
  • Sign in
  •  
    •  

      You are currently accessing V3 .co.uk via your Enterprise account.

      Personalise your on site experience

      Download and use the apps

      Access your subscription from outside of the office

      Get relevant news and insight straight to your inbox

      • Sign in
     
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
  • Follow us
    • RSS
    • Twitter
    • Newsletters
    • Facebook
    • YouTube
  • Register
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
 
  •  

    You are currently accessing V3 .co.uk via your Enterprise account.

    Personalise your on site experience

    Download and use the apps

    Access your subscription from outside of the office

    Get relevant news and insight straight to your inbox

    • Sign in
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 
V3.co.uk
  • Security

Phishers crack two-factor authentication

Next-generation attack spells doom for security system

  • Tom Sanders in California
  • 13 July 2006
  • Tweet  
  • Facebook  
  •  
  •  
  • Send to  
0 Comments
Security experts have detected a new type of phishing attack that could render two-factor authentication useless
A new phishing attack attempts to steal user name, password and temporary password

Security experts have detected a new type of phishing attack that could render two-factor authentication useless.

A dual-factor security system typically uses a password and some kind of hardware security device such as a smartcard or token that issues temporary passwords.

Smartcards are commonly used within corporations, while online transaction systems and banks opt for tokens.

The Security Fix blog reported that researchers at Secure Science Corporation spotted a phishing website targetting Citibank's Citibusiness service that attempted to steal both the user name and password as well as the temporary password issued by the security token.

The site furthermore acted as a middleman that relayed the information to the Citibank server for authentication. It prompted users if the information they entered was incorrect.

"Exactly the same kind of attacks can be used to target other types of two-factor authentication, including one-time password sheets," noted Mikko Hyppönen, chief research officer with F-Secure.

Two-factor authentication systems are considered to be safer than services that rely solely on a user name and password because the temporary passwords expire after a short time. Owners also notice when their tokens or key cards are lost.

But security researchers have warned that attackers could still use the temporary passwords in a real-time attack where they do not wait for the temporary password to expire.

"These days, typical attacks do not engage in this level of sophistication. Usernames and passwords are still collected, but it is usually some time before they are used. Two-factor authentication tokens work well for these very simple-minded attacks," commented Zulfikar Ramzan, a senior principal researcher with Symantec.

"However, if an attack is more sophisticated and the phisher can use the credentials in real time, we are the ones out of luck.

"I believe that two-factor authentication security will be almost futile when we tackle the next generation of phishing attacks."

  • Tweet  
  • Facebook  
  •  
  •  
  • Send to  
  • Topics
  • Security

V3 Latest

First plant to grow on the Moon, err, dies
First plant to grow on the Moon, err, dies

Cotton seedling freezes to death as Chang'e-4 shuts down for the Moon's 14-day lunar night

  • Communications
  • 18 January 2019
Fortnite news and updates: Fortnite made $2.4bn in 2018, according to SuperData
Fortnite news and updates: Fortnite made $2.4bn in 2018, according to SuperData

Fortnite easily out-earns PUBG, Assassin's Creed Odyssey and Red Dead Redemption 2 in 2018

  • Software
  • 18 January 2019
Japanese firm sends micro-satellites into space to deliver artificial meteor showers on demand
Japanese firm sends micro-satellites into space to deliver artificial meteor showers on demand

Meteor showers as a service will be visible for about 100 kilometres in all directions

  • Communications
  • 18 January 2019
Saturn's rings only formed in the past 100 million years, suggests analysis of Cassini space probe data
Saturn's rings only formed in the past 100 million years, suggests analysis of Cassini space probe data

New findings contradict conventional belief that Saturn's rings were formed along with the planet about 4.5 billion years ago

  • Communications
  • 18 January 2019
Back to Top
  • Contact
  • Marketing solutions
  • Enterprise IT Events
  • About
  • Terms & conditions
  • Privacy policy
  • RSS
  • Twitter
  • Newsletters
  • Facebook
  • YouTube

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017