Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3433210.3453084acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article
Public Access

Bypassing Push-based Second Factor and Passwordless Authentication with Human-Indistinguishable Notifications

Published: 04 June 2021 Publication History

Abstract

Second factor (2FA) or passwordless authentication based on notifications pushed to a user's personal device (e.g., a phone) that the user can simply approve (or deny) has become widely popular due to its convenience. In this paper, we show that the effortlessness of this approach gives rise to a fundamental design vulnerability. The vulnerability stems from the fact that the notification, as shown to the user, is not uniquely bound to the user's login session running through the browser, and thus if two notifications are sent around the same time (one for the user's session and one for an attacker's session), the user may not be able to distinguish between the two, likely ending up accepting the notification of the attacker's session.
Exploiting this vulnerability, we present HIENA, a simple yet devastating attack against such "one-push" 2FA or passwordless schemes, which can allow a malicious actor to login soon after the victim user attempts to login triggering multiple near-concurrent notifications that seem indistinguishable to the user. To further deceive the user into accepting the attacker-triggered notification, HIENA can optionally spoof/mimic the victim's client machine information (e.g., the city from which the victim logs in, by being in the same city) and even issue other third-party notifications (e.g., email or social media) for obfuscation purposes. In case of 2FA schemes, we assume that the attacker knows the victim's password (e.g., obtained via breached password databases), a standard methodology to evaluate the security of any 2FA scheme. To evaluate the effectiveness of HIENA, we carefully designed and ran a human factors lab study where we tested benign and adversarial settings mimicking the user interface designs of well-known one-push 2FA and passwordless schemes. Our results show that users are prone to accepting attacker's notification in HIENA with high rates, about 83% overall and about 99% upon using spoofed information, which is almost similar to the rates of acceptance of benign login sessions. Even for the non-spoofed sessions (our primary attack), the attack success rates are about 68%, which go up to about 90-97% if the attack attempt is repeated 2-3 times. While we did not see a statistically significant effect of using third-party notifications on attack success rate, in real-life, the use of such obfuscation can be quite effective as users may only see one single 2FA notification (corresponding to attacker's session) on top of the notifications list which is most likely to be accepted. We have verified that many widely deployed one-push 2FA schemes (e.g., Duo Push, Authy OneTouch, LastPass, Facebook's and OpenOTP) seem directly vulnerable to our attack.

Supplementary Material

MP4 File (asiafp196.mp4)
In this video, we present our paper in title with ?Bypassing Push-based Second Factor and Passwordless Authentication with Human-Indistinguishable Notifications?. First, we give a brief introduction about the traditional two-factor authentication OTP and Push-based tow factor authentication. Fallowed a brief background description of our threat model and the implementation of bush-based two-factor authentications. Then we gave a detail on the attack and study design and its analysis. Followed by potential mitigation approaches against the attack. Finally, we conclude our presentation.

References

[1]
Elizabeth Arens. 2019. Best times to post on social media for 2019. https: //bit.ly/2J7cfLr. (2019). Last accessed Feb 28, 2020.
[2]
Authy. 2019. Authy 2FA -- OneTouch. https://www.twilio.com/authy/features/ push. (2019). Accessed: April 22, 2019.
[3]
Ben Ku. 2018. Does HTTPS Protect Your Privacy? shorturl.at/efA26. (2018). Accessed: Sep 2, 2019.
[4]
CIMB Bank Berhad. 2019. Secure TAC | CIMB Clicks Malayasia. https://bit.ly/ 2LCXroC. (2019). Last accessed May 13, 2019.
[5]
Malayan Banking Berhad. 2019. Secure 2u | Digital Products and Services. https://bit.ly/2LCX51g. (2019). Last accessed May 13, 2019.
[6]
Joseph Bonneau, Cormac Herley, Paul C Van Oorschot, and Frank Stajano. 2012. The quest to replace passwords: A framework for comparative evaluation of web authentication schemes. In Security and Privacy (SP), 2012 IEEE Symposium on. IEEE, 553--567.
[7]
Colin Lecher. 2019. Facebook app developers leaked millions of user records on cloud servers, researchers say. https://bit.ly/2RlQBE7. (2019). Accessed: Sep 2, 2019.
[8]
Jessica Colnago, Summer Devlin, Maggie Oates, Chelse Swoopes, Lujo Bauer, Lorrie Cranor, and Nicolas Christin. 2018. ?It's not actually that horrible": Exploring Adoption of Two-Factor Authentication at a University. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. ACM, 456.
[9]
Dave Albaugh. 2019. Common tech support scams: How to identify and avoid them. shorturl.at/pyQY2. (2019). Accessed: Sep 13, 2019.
[10]
Davey Winder. 2019. Unsecured Facebook Databases Leak Data Of 419 Million Users. https://bit.ly/2lR2nd5. (2019). Accessed: Sep 5, 2019.
[11]
DUO. 2019. Duo Push: Duo Authentication. shorturl.at/pwE16. (2019). Accessed: April 21, 2019.
[12]
EwanD. 2017. Enabling 2FA for MSA. (2017). https://bit.ly/2HihL9p Accessed; Last accessed 11 May, 2019.
[13]
Facebook. 2019. Two-factor authentication for Facebook now easier to set up. https://bit.ly/2MpF3vP. (2019). Accessed: May 10, 2019.
[14]
Adrienne Porter Felt, Elizabeth Ha, Serge Egelman, Ariel Haney, Erika Chin, and David Wagner. 2012. Android permissions: User attention, comprehension, and behavior. In Proceedings of the eighth symposium on usable privacy and security. ACM, 3.
[15]
Futurae. 2019. One-Touch. (2019). https://futurae.com/platform/one-touch/ Accessed; Last accessed 11 May, 2019.
[16]
Google Inc. 2017. Google 2-Step Verification. https://www.google.com/landing/ 2step/. (2017). Accessed: May 13, 2017.
[17]
Amber Gott. 2019. LastPass Authenticator Makes Two-Factor Easy. urlhttps://bit.ly/2HsKbh5. (2019). Accessed; Last accessed 11 May, 2019.
[18]
Matt Gutman. 2015. Snapchat hacked: 4.6 million user names, partial phone numbers leaked - ABC15 Arizona. https://bit.ly/2vSSdKZ. (2015). Accessed: May 5, 2019.
[19]
Identity Automation. 2018. Two-Factor Authentication (2FA) Explained: Push Notifications. https://bit.ly/3hsxDpO. (2018). Accessed: Mar 01, 2020.
[20]
Identity Automation. 2019. Push Authentication using RapidIdentity PingMe. https://bit.ly/2KWvfNj. (2019). Accessed: April 22, 2019.
[21]
International Association of Better Business Bureaus. 2019. BBB Tip: Tech Support Scams. shorturl.at/dsuBJ. (2019). Accessed: Sep 13, 2019.
[22]
Jason Dean Jessica E. Vascellaro and Siobhan Gorman. 2010. Google Warns of China Exit Over Hacking. https://www.wsj.com/articles/SB126333757451026659. (2010). Last accessed Mar 04, 2020.
[23]
Ronald Kainda, Ivan Flechais, and AW Roscoe. 2009. Usability and security of out-of-band channels in secure device pairing protocols. In Proceedings of the 5th Symposium on Usable Privacy and Security. ACM, 11.
[24]
Nikolaos Karapanos, Claudio Marforio, Claudio Soriente, and Srdjan Capkun. 2015. Sound-proof: usable two-factor authentication based on ambient sound. In USENIX Security Symposium.
[25]
Mohit Kumar. 2012. Anonymous leaks database from Israeli Musical Act Magazine site #OpIsrael. https://bit.ly/2Y84yqo. (2012). Accessed: May 5, 2019.
[26]
Mohit Kumar. 2012. Bulgarian torrent tracker forum hacked and accused of collecting user IP. https://bit.ly/2VSqLvf. (2012). Accessed: May 5, 2019.
[27]
LastPass. 2019. The only authenticator app you need. https://lastpass.com/auth/. (2019). Accessed: Mar 3, 2020.
[28]
Laura Hautala. 2019. Instagram website leaked phone numbers and emails for months, researcher says. https://cnet.co/2WjilNz. (2019). Accessed: Sep 2, 2019.
[29]
Pierpaolo Loreti, Lorenzo Bracciale, and Alberto Caponi. 2018. Push Attack: Binding Virtual and Real Identities Using Mobile Push Notifications. Future Internet 10, 2 (2018), 13.
[30]
Microsoft. 2019. Enable passwordless sign-in with the Microsoft Authenticator app. https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-authentication-passwordless-phone. (2019). Accessed: Mar 01, 2020.
[31]
Ariana Mirian, Joe DeBlasio, Stefan Savage, Geoffrey M Voelker, and Kurt Thomas. 2019. Hack for hire: Exploring the emerging market for account hijacking. In The World Wide Web Conference. 1279--1289.
[32]
RCDevs. 2019. Multi-Factor with OTP and FIDO-U2F. https://www.rcdevs.com/ products/openotp/. (2019). Accessed: May 10, 2019.
[33]
Ken Reese, Trevor Smith, Jonathan Dutson, Jonathan Armknecht, Jacob Cameron, and Kent Seamons. 2019. A Usability Study of Five Two-Factor Authentication Methods. In Fifteenth Symposium on Usable Privacy and Security ({SOUPS} 2019).
[34]
RSA Security. 2019. Mobile Authentication | Push Notification. https://bit.ly/ 2UA6wxC. (2019). Accessed: April 22, 2019.
[35]
Muhammad Shahzad, Alex X Liu, and Arjmand Samuel. 2013. Secure unlocking of mobile touch screen devices by simple gestures: you can see it but you can not do it. In Proceedings of the 19th annual international conference on Mobile computing & networking. ACM, 39--50.
[36]
Maliheh Shirvanian, Stanislaw Jareckiy, Hugo Krawczykz, and Nitesh Saxena. 2017. SPHINX: A password store that perfectly hides passwords from itself. In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE, 1094--1104.
[37]
Maliheh Shirvanian and Nitesh Saxena. 2015. On the security and usability of crypto phones. In Proceedings of the 31st Annual Computer Security Applications Conference. ACM, 21--30.
[38]
Anatoly Shusterman, Lachlan Kang, Yarden Haskal, Yosef Meltser, Prateek Mittal, Yossi Oren, and Yuval Yarom. 2019. Robust website fingerprinting through the cache occupancy channel. In 28th {USENIX} Security Symposium (USENIX Security 19). 639--656.
[39]
Nikhil Sonnad. 2015. What's in the Ashley Madison database that hackers released online - Quartz. https://bit.ly/1WFcrP6. (2015). Accessed: May 5, 2019.
[40]
Joshua Sunshine, Serge Egelman, Hazim Almuhimedi, Neha Atri, and Lorrie Faith Cranor. 2009. Crying Wolf: An Empirical Study of SSL Warning Effectiveness. In USENIX security symposium. 399--416.
[41]
Viktoriya Trifonova. 2018. How Device Usage Changed in 2018 and What it Means for 2019. shorturl.at/gmKV8. (2018). Accessed: May 5, 2019.
[42]
Twilio. 2019. Authy: 2FA and Passwordless Login. https://www.twilio.com/docs/ authy. (2019). Accessed: Mar 01, 2020.
[43]
Jordan Valinsky. 2019. Cyber Monday was the biggest shopping day in Amazon's history. shorturl.at/grLNZ. (2019). Last accessed Feb 28, 2020.
[44]
Anthony Vance, Brock Kirwan, Daniel Bjornn, Jeffrey Jenkins, and Bonnie Brinton Anderson. 2017. What do we really know about how habituation to warnings occurs over time?: A longitudinal fMRI study of habituation and polymorphic warnings. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, 2215--2227.

Cited By

View all
  • (2025)An In-Depth Analysis of Password Managers and Two-Factor Authentication ToolsACM Computing Surveys10.1145/371111757:5(1-32)Online publication date: 24-Jan-2025
  • (2024)Breaching Security Keys without Root: FIDO2 Deception Attacks via Overlays exploiting Limited Display AuthenticatorsProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690286(1686-1700)Online publication date: 2-Dec-2024
  • (2023)Evaluation of Real-World Risk-Based Authentication at Online Services Revisited: Complexity WinsProceedings of the 18th International Conference on Availability, Reliability and Security10.1145/3600160.3605024(1-9)Online publication date: 29-Aug-2023
  • Show More Cited By

Index Terms

  1. Bypassing Push-based Second Factor and Passwordless Authentication with Human-Indistinguishable Notifications

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ASIA CCS '21: Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security
    May 2021
    975 pages
    ISBN:9781450382878
    DOI:10.1145/3433210
    • General Chairs:
    • Jiannong Cao,
    • Man Ho Au,
    • Program Chairs:
    • Zhiqiang Lin,
    • Moti Yung
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 04 June 2021

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. authentication
    2. multi-factor authentication
    3. push-based two-factor authentication
    4. security and privacy

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    ASIA CCS '21
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 418 of 2,322 submissions, 18%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)353
    • Downloads (Last 6 weeks)32
    Reflects downloads up to 20 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)An In-Depth Analysis of Password Managers and Two-Factor Authentication ToolsACM Computing Surveys10.1145/371111757:5(1-32)Online publication date: 24-Jan-2025
    • (2024)Breaching Security Keys without Root: FIDO2 Deception Attacks via Overlays exploiting Limited Display AuthenticatorsProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690286(1686-1700)Online publication date: 2-Dec-2024
    • (2023)Evaluation of Real-World Risk-Based Authentication at Online Services Revisited: Complexity WinsProceedings of the 18th International Conference on Availability, Reliability and Security10.1145/3600160.3605024(1-9)Online publication date: 29-Aug-2023
    • (2023)A Study of Different Awareness Campaigns in a CompanyProceedings of the 18th International Conference on Availability, Reliability and Security10.1145/3600160.3605006(1-8)Online publication date: 29-Aug-2023
    • (2023)Breaking Mobile Notification-based Authentication with Concurrent Attacks Outside of Mobile DevicesProceedings of the 29th Annual International Conference on Mobile Computing and Networking10.1145/3570361.3613273(1-15)Online publication date: 2-Oct-2023
    • (2023)Secure UHF RFID Authentication With Smart DevicesIEEE Transactions on Wireless Communications10.1109/TWC.2022.322675322:7(4520-4533)Online publication date: 1-Jul-2023
    • (2023)A Review of Modern Authentication Methods in Digital Systems2023 Annual International Conference on Emerging Research Areas: International Conference on Intelligent Systems (AICERA/ICIS)10.1109/AICERA/ICIS59538.2023.10420169(1-6)Online publication date: 16-Nov-2023
    • (2023)Persistent MobileApp-in-the-Middle (MAitM) attackJournal of Computer Virology and Hacking Techniques10.1007/s11416-023-00484-z20:1(27-39)Online publication date: 30-Jun-2023
    • (2021)Countering Concurrent Login Attacks in “Just Tap” Push-based Authentication: A Redesign and Usability Evaluations2021 IEEE European Symposium on Security and Privacy (EuroS&P)10.1109/EuroSP51992.2021.00013(21-36)Online publication date: Sep-2021

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media