FB pixel

Cybersecurity firm flags FIDO authentication downgrade phishing attack risk

Cybersecurity firm flags FIDO authentication downgrade phishing attack risk
 

A new downgrade attack designed to bypass FIDO authentication with a “dedicated phishlet” has been discovered by enterprise cybersecurity provider Proofpoint.

The adversary-in-the-middle (AiTM) attack starts out in a recognizable way, with a phishing message that includes a link to a webpage that looks like a legitimate login portal, but is a malicious fake, a blog post from the Canada-based company explains. From there, however, it differs, and unlike other downgrade attacks that affect certain implementations of FIDO authentication, in particular with Windows Hello for Business (WHfB), it can be used to phish Microsoft Entra ID users regardless of the implementation.

Because FIDO2 authentication, such as with passkeys, is not supported with Entra on all browsers, hackers can spoof an unsupported user agent, such as Safari on Windows, with a specially crafted phishlet.

A phishlet, Proofpoint explains, “is a configuration file or template used by phishing kits to define the impersonation of legitimate websites and interception of user credentials and session tokens.”

Legacy phishlets are designed to harvest traditional credentials and bypass legacy multi-factor authentication (MFA) systems, and return an error when faced with FIDO authentication. But Proofpoint researchers have built a dedicated phishlet using the Evilginx AiTM attack framework that forces the target to use a less secure authentication method.

The less secure login credential, such as a verification code from the Microsoft Authenticator app, is intercepted along with the session cookie, and the attacker imports the cookie into their browser.

“Despite the lack of observed usage by threat actors, Proofpoint considers FIDO authentication downgrade attacks as a significant emerging threat,” the company summarizes. “These attacks could be carried out by sophisticated adversaries and APTs (namely state-sponsored actors or technically savvy hackers).”

A passkey downgrade attack was recently reported and then walked back, with a recommendation that FIDO protects against legacy “phishable” MFA, so long as FIDO Cross-Device Authentication flow is properly implemented.

Related Posts

Article Topics

 |   |   |   |   | 

Latest Biometrics News

 

Ring and Flock call off integration as scrutiny of camera-to-police partnership intensifies

Amazon-owned Ring and Flock Safety have canceled their planned partnership, stepping back from an integration that would have linked one…

 

MOSIP pursues democratization of digital identity with unconference conversations

A democratic vision of digital identity is central to the non-profit, open-source mandate of MOSIP. As the organization and the…

 

Liveness is king: FaceTec’s Jay Meier in conversation with Chris Burt 

It’s best, says Jay Meier, to think about identity management as a system of symbiotic systems. Which is to say,…

 

Ofcom fines Kick, threatens 4chan as OSA enforcement steadily dials up

UK regulator Ofcom has faced criticism for being too slow and lenient with its power to enforce the Online Safety…

 

Innovatrics, ROC improve rankings in NIST ELFT, rising to 2 and 3 respectively

Innovatrics is celebrating success in the latest National Institute of Standards and Technology (NIST) Evaluation of Latent Fingerprint Technologies (ELFT)…

 

Meta plans launch of facial recognition to smart glasses in ‘dynamic political environment’

Meta is reportedly planning to roll out facial recognition capabilities for its smart glasses as early as this year, taking…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Biometric Market Analysis and Buyer's Guides

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events