Mikäs olisi hyvä korvike microsoftin ja googlen authenticatoreille? #authenticator #google #microsoft #tietoturva
Mikäs olisi hyvä korvike microsoftin ja googlen authenticatoreille? #authenticator #google #microsoft #tietoturva
If your internet is sufficiently slow, a #OTP one time password provided by an #authenticator will expire before the login using it completes, so you are stuck. First time for everything....
How long, you think, until Google and Microsoft make their authenticator products start charging users to get rid of the ads they will invariably place in to those products at some point?
Microsoft discontinuing password autofill (and password manager features) in their Authenticator app. It’s replaced with Microsoft Edge.
The feature will be fully removed in August 2025.
https://www.bleepingcomputer.com/news/security/microsoft-ends-authenticator-password-autofill-moves-users-to-edge/
- - -
Microsoft met à la retraite le remplissage de mots de passe (et la fonction de gestion de mots de passe) dans leur app Authenticator. C’est remplacé par Microsoft Edge.
La fonctionnalité sera entièrement retirée en août 2025.
// Article en anglais //
Microsoft - the Walmart of passkeys...
Microsoft’s new “passwordless by default” is great but comes at a cost
Just #donate 'd to 11 #foss projects, despite my irregular income ( #artist #life ). Besides money it also did cost some time due to so many different #donation platforms, unfortunately.
I'll try to list the projects as accounts or at least a tag (not all are on Mastodon, unfortunately).
#aveslibre @davx5app @kde #keepass #keepasdx @ShareX @silverbulletmd #stratum #authenticator #tasksorg @termux
It seems that @bitwarden has released an Android and iOS TOTP Authentication app (separate from the password manager app)
It seems this was released some time ago but I don't recall seeing any announcements at the time
I am looking for a #foss or at least #eu or #efta based #2fa #authenticator app that is available for #ios to migrage away from the #techbro authenticator I am currently using. My first investigation brought up 2FAS. Is this a recommended piece of software? Any alternatives?
---
#unplugtrump
Hi Fedi friends,
I'm looking to change my Google authenticator app for a more privacy-oriented, reliable alternative. For iOS.
Haven't tried any so far, but I've read about Ente, Yubikey and 2FAS.
Do you have recommandations?
The really annoying one is going to be GitHub, since most things I'm at least already logged into (plush is amongst the services hit...), but they have some bank-tier session expiry.
Remember that resetting 2FA may *also* reset your recovery codes, for the next time Google #Authenticator decides to discard your data and risk locking you out of services you trusted it to help you secure access to.
@gunchleoc @mozilla I hate "#Authenticator #Apps" because there is no valid reason why they couldn't use #TOTP and/or #HOTP for that...
#Passkeys in Microsoft #Authenticator will be generally available in mid-January 2025!
With the general availability of passkeys in Microsoft Authenticator, the need to have key restrictions set to use passkeys in Microsoft Authenticator will disappear.
So, by mid-January, passkeys will become a fully functional phishing-resistant authentication option equivalent to physical #FIDO2 keys. Attestation is already supported now, and in mid-January the preview phase will disappear and support without key restrictions will come.
Conversely, if you don't want to support passkeys in Microsoft Authenticator for some reason, you'll need to implement key restrictions and start actively blocking iOS and Android apps. If you plan to allow users to sign in with passkeys in Microsoft Authenticator, you don't need to do anything and it will be fully functional by mid-January.
And if you have conditional access policies that require passkey/FIDO2, users will automatically be prompted to register passkeys in Microsoft Authenticator.
Details can be found directly in the Microsoft 365 Message Center https://mc.merill.net/message/MC920300
@kuketzblog +9001%
Insbesondere da viele #Authenticator - #Apps entwender nur #SingleVendor & #SingleProvider - #Müll, #Bloatware, #Govware oder gänzlich unsicher sind.
#AppZwang gehört verboten und ich hoffe @digitalcourage diesbezüglich mehr Druck macht, denn #Digitalzwang wird allzuoft als #Waffe gegen #Marginalisierte genutzt!
@GrapheneOS @thomas @wonka Also I think the issues usually outweigh the benefits - at least when we look at individuals & devices owned by consumers vs. corporate #ITsec where locking down devices is seen as desireable!
Because for every "#LegitimateInterest" (i.e. #2FA #Authenticator) I can find a dozen reasons this "functionaloty" should be discontinued and considered malware.
2/2 Des nouvelles de l'enfer #Microsoft...
L'enfer des deux dernières heures s'appelle Microsoft #Authenticator, une appli sur Android qui m'autorise à accéder aux comptes sur PC. Le truc est tellement sécurisé que c'est la croix et la bannière pour l'utiliser ! (Pour une lambda comme moi, alors que je fais confiance aux hackers pour contourner l'obstacle.) Comme c'est une appli sur Android, j'ai d'abord essayé de l'utiliser sur mon smartphone, et j'ai bien tourné en rond. Ouf, avec le plan B, qui est ma tablette Android, ça marche
!
In *2019*, Alex Weinert of Microsoft wrote in https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/all-your-creds-are-belong-to-us/ba-p/855124:
«
MFA had failed.
[...]
All Authenticators Are Vulnerable
[...]
»
Today, as echoed in https://www.bleepingcomputer.com/news/microsoft/microsoft-enable-mfa-or-lose-access-to-admin-portals-in-october/, Microsoft still insists that using weak MFA is a good idea.
In https://azure.microsoft.com/en-us/blog/announcing-mandatory-multi-factor-authentication-for-azure-sign-in/ Microsoft writes (on August 15):
«
As recent research [1] by Microsoft shows that multifactor authentication (MFA) can block more than 99.2% of account compromise attacks, making it one of the most effective security measures available, today’s announcement brings us all one step closer toward a more secure future.
»
From that same article, "solutions" with (nearly as weak as SMS) "Microsoft Authenticator" is at the TOP of their list:
«
Organizations have multiple ways to enable their users to utilize MFA through Microsoft Entra:
• Microsoft Authenticator [...]
• FIDO2 security keys [...]
• Certificate-based authentication [...]
• Passkeys [...]
• Finally, and this is the least secure version of MFA, you can also use a SMS or voice approval [...]
»
From [1] (PDF) = https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RW166lD?culture=en-us , no date of the "investigation period" to be seen *anywhere*, and one of the authors being Alex Weinert, more extreme percentages (approved by Microsoft's marketing dept):
«
Our findings reveal that MFA implementation offers outstanding protection, with over 99.99% of MFA-enabled accounts remaining secure during the investigation period. Moreover, MFA reduces the risk of compromise by 99.22% across the entire population and by 98.56% in cases of leaked credentials.
»
Dear reader: please stop buying Microsoft BS that completely ignores PhaaS.
To name a few examples:
"Experts agree [*] that setting up two-factor authentication (2FA) İs one of the most powerful ways to protect your account from getting hacked. However, hackers like COLDRIVER and COLDWASTREL may try to trick you into entering your second factor; we have seen attackers successfully compromise a victim who had enabled 2FA." - (PDF) https://www.accessnow.org/wp-content/uploads/2024/08/Spearphishing-cases-in-Eastern-Europe-2022-2024-technical-brief.pdf
[*] Not me. My tip is here: https://infosec.exchange/@ErikvanStraten/112724966066248808
EvilGinx2: "Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication" - https://github.com/kgretzky/evilginx2 (there are more, like Modlishka, Muraena, CredSniper, EvilProxy (Phaas), NakedPages etc.)
Not even a fake website needed: https://www.bleepingcomputer.com/news/security/new-greatness-service-simplifies-microsoft-365-phishing-attacks/
From https://mrd0x.com/attacking-with-webview2-applications/:
«
Bypass 2FA
WebView2 also provides built-in functionality to extract cookies. This allows an attacker to extract cookies after the user authenticates into the legitimate website. This technique removes the need of having to spin up Evilginx2 or Modlishka but the obvious trade-off is that the user must execute the binary and authenticate.
»
In addition, from https://www.bleepingcomputer.com/news/security/clever-phishing-method-bypasses-mfa-using-microsoft-webview2-apps/:
«
"Yubikeys can't save you because you're authenticating to the REAL website not a phishing website."
mr.d0x
»
AND:
«
However, as mr.d0x admits and Microsoft pointed out in their response to our questions, this attack is a social engineering attack and requires a user to run a malicious executable.
»
Correct, but a local compromise does'nt protect you when you're using FIDO2 hardware keys or passkeys.
From 2022: https://microsoft.com/en-us/security/blog/2022/07/12/from-cookie-theft-to-bec-attackers-use-aitm-phishing-sites-as-entry-point-to-further-financial-fraud/:
«
A large-scale phishing campaign that used adversary-in-the-middle (AiTM) phishing sites stole passwords, hijacked a user’s sign-in session, and skipped the authentication process even if the user had enabled multifactor authentication (MFA).
»
"Phishing with Cloudflare Workers: Transparent Phishing and HTML Smuggling" - https://www.netskope.com/blog/phishing-with-cloudflare-workers-transparent-phishing-and-html-smuggling
"New EvilProxy Phishing Service Allowing Cybercriminals to Bypass 2-Factor Security" - https://thehackernews.com/2022/09/new-evilproxy-phishing-service-allowing.html
From https://www.europol.europa.eu/media-press/newsroom/news/international-investigation-disrupts-phishing-service-platform-labhost:
«
The investigation uncovered at least 40 000 phishing domains linked to LabHost, which had some 10 000 users worldwide.
[...]
LabRat was designed to capture two-factor authentication codes and credentials, allowing the criminals to bypass enhanced security measures.
»
"Security and Privacy Failures in Popular 2FA Apps" by Gilsenan et al. (USENIX 2023): https://www.usenix.org/conference/usenixsecurity23/presentation/gilsenan
The PDF can also be found here: https://github.com/blues-lab/totp-app-analysis-public (Aegis was one of the least problematic apps, and don't use Authy).
This is what is wrong with weak MFA/2FA:
You
o
/|\ [device + browser]
/ \ |
v
[login.microsoftonline-aitm.com]
|
v
[login.microsoftonline.com]
(no thanks to DV-certificates).
@luca "Wie man eine vertrauenswürdige Authentifizierungs-App auswählt" https://www.karl-voit.at/2023/03/05/TOTP-Auswahl/
Ich würde dringend von #Google #Authenticator wegwechseln.
Bin kürzlich selber zu #Aegis gewechselt, wo ich nicht #FIDO2 keys verwenden kann.
Dear #Security and #Auth types, given a world where employees use shared work computers, and labour laws prevent employers from asking workers to install an #Authenticator app or accept SMS #OTP on their personal de devices.
What #2FA models are practical for securing things like workers’ emails, #HRIS accounts, #Payroll accounts, etc.
#Duo #Okta #InfoSec @iamkale #FIDO2 #Passkeys
“Are you enjoying Duo Mobile” …
How can I tell you… I enjoy it as much as having to brush my teeth after each meal or emptying the dishwasher..
do I wish I didn’t have to use it at all? YES
can I do without it at the moment? Unfortunately NO because for some reason our lives are governed by the ever-present but really, really small risk that someone might want to hack my work email..
(Duo mobile is one of these #Authenticator apps)