Skip to main content

Chinese hackers allegedly bypassed 2 factor-authentication, claims report

Security researchers have discovered a hacker group has been bypassing 2FA, more commonly known as two-factor authentication. The group, known as APT20, has ties to the Chinese government and that they have been targeting other government entities. A Dutch security firm called Fox-IT was the one to discover the attacks and publish a report on it.

The hacker group’s activities date back all the way to 2011, however, the report states that security researchers lost track of APT20 once they change their modus operandi. Its only in the last two years that Fox-IT has been able to figure out what the group has been up to. The group had allegedly been infiltrating targeted computers using a sophisticated method of first isolating a vulnerable machine on the target network. Then, the group would install web shells and start looking for administrator passwords on the machine. What stood out to the researchers was that fact that APT20 was able to connect to VPNs protected by 2FA.

Fox-IT notes that they aren’t sure about how APT20 managed to bypass 2FA on those VPN accounts, but do offer a hypothetical. “The software token is generated for a specific system, but of course this system specific value could easily be retrieved by the actor when having access to the system of the victim.

As it turns out, the actor does not actually need to go through the trouble of obtaining the victim's system specific value, because this specific value is only checked when importing the SecurID Token Seed, and has no relation to the seed used to generate actual 2-factor tokens. This means the actor can actually simply patch the check which verifies if the imported soft token was generated for this system, and does not need to bother with stealing the system specific value at all.

In short, all the actor has to do to make use of the 2 factor authentication codes is to steal an RSA SecurID Software Token and to patch 1 instruction, which results in the generation of valid tokens.”

While the hacker group was only focused on infiltrating government institutions, what’s rather scary is that they were able to find a way to circumvent 2 factor authentication, currently one of the most secure ways of keeping your account safe. The report doesn’t state whether the fundamental nature of 2FA has been violated, or whether it was only a weak link in the entire authentication chain that allowed the hackers to pull this off.



from Latest Technology News https://ift.tt/2ZkAxWa

Comments

Popular posts from this blog

Infinix Note 40X 5G With Dimensity 6300 5G SoC, 108-Megapixel Rear Camera Launched in India: All Details

Infinix Note 40X 5G was launched in India on Monday (August 5). The latest Note series phone from the Transsion Holdings subsidiary comes with a MediaTek Dimensity 6300 5G under the hood paired with up to 12GB of RAM. The Infinix Note 40X 5G boasts a triple rear camera setup headlined by a 108-megapixel main sensor and packs a 5,000mAh battery. from Gadgets 360 https://ift.tt/ZIHkQUw

Amazon Great Indian Festival Sale 2023: Best Camera Smartphones Under Rs. 20,000

Amazon Great Indian Festival Sale 2023 is currently underway with great offers and discounts on a wide range of products. If you are on a tight budget and looking to upgrade to a smartphone with better camera features, the ongoing sale currently offers plenty of choices. Here are some of the best camera smartphones under Rs. 20,000. from Gadgets 360 https://ift.tt/AUWj8uo

Samsung Galaxy S25 Series Could Reportedly Arrive With Exynos 2500 Chip, as Samsung Attempts to Improve Yield

Samsung Galaxy S25 series could be equipped with an Exynos 2500 chipset after all, according to a South Korean publication, following reports that the company would use Qualcomm's next-generation Snapdragon mobile processor for its upcoming flagship smartphones. The firm is reportedly working on improving the yield of its chipset, with only a few months to go before t... from Gadgets 360 https://ift.tt/ZqHS8yj