Categories: SecuritySoftware

Analyst Names And Shames Two-Factor Security Failings

Strong two-factor authentication is falling short, and businesses need to take notice, according to a report from Gartner.

In a new report, “Where Strong Authentication Fails and What You Can Do About It,” Gartner analyst Avivah Litan contends that Trojan-based, man-in-the-browser attacks are circumventing strong two-factor authentication and proving that any authentication method that relies on browser communications can be defeated. This includes chip cards and biometric technologies.

“Fraudsters have been raiding user bank accounts that seemingly were protected by strong two-factor authentication, but any sensitive Web application is similarly vulnerable,” she wrote. “In some cases, the malware copies the user’s ID, password and OTP, and immediately uses them. Other times, the malware overwrites user transactions with the crook’s transactions, unbeknownst to the user or service provider, e.g., the online bank.”

Two-factor authentication based on telephony is also being beaten as well using call forwarding, which ensures that the fraudster – and not the legitimate customer – is called by the service provider performing the authentication, she noted.

“These attacks have been successfully and repeatedly executed against many banks and their customers across the globe in 2009,” said Litan in a press release. “However, while bank accounts are the main immediate target, these attack methods will migrate to other sectors and applications that contain sensitive valuable information and data.”

The answer to all this is, she contends, is a mix of fraud detection that monitors user access behavior and monitors suspect transaction values. In an e-mail, she told eWEEK: “The fraud prevention market has done OK in 2009 despite severe budget cuts in the financial services sector. It hasn’t grown much but it hasn’t shrunk, either.”

Enterprises should also consider out-of-band verification that does not use the same primary communication channel as the user in order to verify a transaction request. Key to this, she notes in the report, is for enterprises to use out-of-band communications that can prevent their calls from being forwarded to phone numbers they have not registered and vetted for a legitimate user account, she writes in the report.

“A layered fraud prevention approach that includes server-based fraud detection and out-of-band transaction verification that precludes call forwarding to illegitimate user phone numbers has been proven to mitigate these threats… Enterprises need to protect their users and accounts using a three-prong layered fraud prevention approach that uses stronger authentication, fraud detection and out-of-band transaction verification and signing for high risk transaction,” Litan said in the press release.

Brian Prince eWEEK USA 2014. Ziff Davis Enterprise Inc. All Rights Reserved

Share
Published by
Brian Prince eWEEK USA 2014. Ziff Davis Enterprise Inc. All Rights Reserved

Recent Posts

Italy, White House Condemn ‘Discriminatory’ Tech Taxes

Italy, White House issue joint statement condemning 'discriminatory' tech taxes as US seeks to end…

4 hours ago

Italian Newspaper Hails ‘Success’ With AI-Generated Supplement

Italian newspaper Il Foglio says four-page AI-generated supplement published every day for a month shows…

5 hours ago

Huawei Updates Smart Glasses With Live Translation

Huawei launches Titanium edition of Eyewear 2 smart glasses with gesture controls and AI-powered simultaneous…

5 hours ago

Head Of Chinese Chip Tools Company Drops US Citizenship

Gerald Yin, founder, chairman and chief executive of key Chinese chip tools maker AMEC, drops…

6 hours ago

Intel Tells Chinese Clients Some AI Chips To Require Licence

Intel reportedly tells clients in China some of its AI chips will now require export…

6 hours ago

Intel Chief Flattens Leadership Structure

New Intel chief executive Lip-Bu Tan flattens company's leadership structure as he seeks to end…

7 hours ago