• @kadu
      link
      591 year ago

      deleted by creator

      • metaStatic
        link
        fedilink
        581 year ago

        Authenticator to the left of me, SMS to the right, here I am Man In The Middle Attack.

      • @PoorlyWrittenPapyrus
        link
        481 year ago

        Happened to me because I had an account on a crypto exchange. The attacker went in to my phone carrier’s store, likely with a fake ID, convinced the store they were me, then got a new SIM card and reset my password on everything they could with it. They logged in to my crypto exchange mere minutes after they got the SIM, saw the $0.03 in my account, and logged out.

      • @[email protected]
        link
        fedilink
        141 year ago

        Sometimes it’s less about the person that you’re targeting and more about what that access gives you.

        Low level accountant? Office worker with an excel file full of passwords or has correspondence with your actual target at a different company that you can pose as to gain access into?

        They’re just a step in the process.

      • @mea_rah
        link
        91 year ago

        I’m not sure where this idea of high profile target comes from. The sim swap attack is pretty common. People just need to be in some credentials leak DB with some hint of crypto trading or having some somewhat interesting social media account. (either interesting handle or larger number of followers)

        There are now organized groups that essentially provide sim swap as a service. Sometimes employees of the telco company are in on it. The barrier to entry is not that high, so the expected reward does not need to be that much higher.

    • @[email protected]
      link
      fedilink
      261 year ago

      The least secure part of the sign-in process is the person. It doesn’t matter what the 2FA method is.

      You can be using a one time pin and someone can look at your paper and see the next one. Someone can trick your grandma into giving out the Google authenticator pin over the phone because “they’re from Google”. Someone can trick you into making the financial transfer yourself because “you’re getting a deal”.

        • @[email protected]
          link
          fedilink
          71 year ago

          Which is why sms-based 2fa is useless if you’re being targeted by a motivated hacker. If you’re an important person (e.g. a government official, an exec on a big corp, a celebrity, etc) it’s not safe to use sms-based 2fa. Heck, even if you’re nobody, a hacker might decided to target you anyway to access the company you’re currently working at, or because you have something they want (e.g. a desirable Twitter handle). One call to your cellphone carrier to complain about losing phone, with some social engineering skill to dupe the minimum wage call center worker who doesn’t really care about being vigilant, and suddenly the hacker gain access to your cellphone number (doubly easier to with e-sim) and thus your sms-based 2fa.

    • @[email protected]
      link
      fedilink
      151 year ago

      Although it’s true that you are increasing the attack surface when compared to locally stored OTP keys, in the context of OTPs, it doesn’t matter. It still is doing it’s job as the second factor of authentication. The password is something you know, and the OTP is something you have (your phone/SIM card).

      I would argue it is much worse what 1Password and Bitwarden (and maybe others?) allows the users to do. Which is to have the both the password and the OTP generator inside the same vault. For all intents and purposes this becomes a single factor as both are now something you know (the password to your vault).

      • @[email protected]
        link
        fedilink
        English
        111 year ago

        That’s not quite right though, there’s the factor you know (password to your vault), and the factor you have (a copy of the encrypted vault).

        Admittedly, I don’t use that feature either, but, it’s not as bad as it seems at first glance.

        • @[email protected]
          link
          fedilink
          3
          edit-2
          1 year ago

          That’s not quite right though, there’s the factor you know (password to your vault), and the factor you have (a copy of the encrypted vault).

          That would be true for offline vaults, but for services hosted on internet I don’t think so. Assuming the victim does not use 2FA on their Bitwarden account, all an attacker needs is the victim’s credentials (email and password). Once you present the factor you know, the vault is automatically downloaded from their services.


          This is something I hadn’t thought until know, but I guess password managers might(?) change the factor type from something you know (the password in your head) to something you have (the vault). At which point, if you have 2FA enabled on other services, you are authenticating with 2 things you have, the vault and your phone.

          • jpj007
            link
            fedilink
            41 year ago

            Assuming the victim does not use 2FA on their Bitwarden account

            A pretty tall assumption given that we’re already talking about someone who knows to turn on 2FA for other things. If someone knows about 2FA and password managers, they’d be insane not to have 2FA set up on the password manager itself.

            • @[email protected]
              link
              fedilink
              2
              edit-2
              1 year ago

              That’s a fair point. I just wanted to highlight that there may be cases where a password manager isn’t automatically protected by 2FA by the two factors you mentioned (The password you know and the copy of the vault) since in the case of bitwarden fulfilling one can give you the second. In order to actually achieve 2FA in this case, you would need to enable OTPs.

              • jpj007
                link
                fedilink
                21 year ago

                Certainly fair.

                And yeah, I personally use Bitwarden with 2FA on the Bitwarden account, but don’t store any 2FA tokens in Bitwarden, handling them all separately. Don’t want all the eggs in one basket.

                Though given I have fingerprint access on phone and computer for bitwarden, i suppose that one basket is my finger. But if someone is taking my finger, I’ve got more immediate concerns than my passwords.

          • @[email protected]
            link
            fedilink
            31 year ago

            It works for self hosted vaultwarden mostly also. Since you would need a way to acess the login page itself, which could be behind a VPN or other authentication service like Authentik.

      • @Rehwyn
        link
        3
        edit-2
        1 year ago

        Arguably, if you use 2FA to access your passwords in 1password, there’s little difference between storing all your other OTPs in 1password or a separate OTP app. In both cases, since both your secret passwords and OTPs are on the same device (your phone), you lack a true second factor. The most likely way someone would gain access to 1password secured with 2FA is if they control your device and it’s been compromised, and having your OTPs separated wouldn’t provide additional protection there. Thankfully, the larger benefit of OTPs for most people is that they are one-time-use, not that they originate from a second factor.

        There is one theoretical situation I can think of where having your OTPs and passwords separate could be an advantage, and that’s if someone gained all your 1password login details, including the 2FA secret key. But for someone able to gather that much sensitive intel, I’m not sure how much more of a challenge an authenticator app would be.

        If you truly feel you need a second factor though, you’ll probably want to look at something like a Yubikey or Titan. I’ve considered getting one to secure my 1password vault to reduce the risk of a lost phone compromising my vault.

        • LUHG
          link
          11 year ago

          Get it. Stop procrastinating;-)

        • @[email protected]
          link
          fedilink
          11 year ago

          Arguably, if you use 2FA to access your passwords in 1password, there’s little difference between storing all your other OTPs in 1password or a separate OTP app. In both cases, since both your secret passwords and OTPs are on the same device (your phone), you lack a true second factor. The most likely way someone would gain access to 1password secured with 2FA is if they control your device and it’s been compromised, and having your OTPs separated wouldn’t provide additional protection there. Thankfully, the larger benefit of OTPs for most people is that they are one-time-use, not that they originate from a second factor.

          As you said if you have both the password manager and the OTP manager in the same device it goes against the concept of 2FA, and you can throw most of guarantees out the window.

          I think one distinction worth making is that the encrypted vault itself is still only protected by one factor, the password. The OTP 1Password asks you is part of their service authentication mechanism. If for some reason the attacker manages to get an encrypted copy of your vault (Via App cache, Browser add-on cache, mitm, 1Password’s servers, etc…), “all” the attacker needs is to brute force your password and they can access the contents (Password and OTP seeds) of the vault without requiring the TOPT token. Yes you can mitigate this with a good password/passphrase, but as GPUs/CPUs get faster will that password continue to be good enough in few years time? If your master password becomes “easily” brute forceable, now the attacker has access to all of your accounts because you had the password and OTP seeds in one vault.

          If you truly feel you need a second factor though, you’ll probably want to look at something like a Yubikey or Titan. I’ve considered getting one to secure my 1password vault to reduce the risk of a lost phone compromising my vault.

          I have one, but unfortunately the amount of services that support U2F as a 2FA mechanism is relatively small and if you want to talk about FIDO2 passwordless authentication even less.

      • @[email protected]
        link
        fedilink
        English
        31 year ago

        This is why we require second factor on the password manager too, otherwise you’re exactly right.

    • @Agent641
      link
      101 year ago

      Stop using 2fa where its not needed. My university library logs me out every 45 minutes and requires microsoft authentication to log in.

      Seriously, whats a hacker going to do if tgey get my password,download a PDF? Send a citation to my Favorites list?

      • @Squizzy
        link
        71 year ago

        Bulk download a shit ton of research papers through the university’s educational license and distribute them for free on the internet, cutting out the completely unnecessary profit driven middle man leading you to eventually do away with yourself due to the pressure from the government and corporations to make an example out of you with a strong sentence.

    • @mvirts
      link
      21 year ago

      But wait it has to be double secure, it has two s’s in its name!!

  • @[email protected]
    link
    fedilink
    English
    591 year ago

    USPS’ website does this, sort of.

    If their text service is down it’ll let you know and just skip the 2FA process even though normally they offer an option to get the code via email.

    The fact that they do this is bad enough, the fact that this happens so often that I’ve seen this at least a dozen times is even worse.

  • @Agent641
    link
    281 year ago

    Our authentication system is experiencing difficulty, please just type ADMIN / ADMIN.

    Please just dont do anything you arent supposed to, my boss will kill me

    • 𝘋𝘪𝘳𝘬OP
      link
      fedilink
      171 year ago

      Our authentication system is experiencing difficulty, please just type ADMIN / ADMIN.

      The password you have entered is already used by user RandoMcRandom123, please use another password.

  • @[email protected]
    link
    fedilink
    English
    181 year ago

    I appreciate the quick hack, but with a little more foresight you could have just put up a blurry jpeg with that number and changed the prompt so it looks like a CAPTCHA. Nobody would have given it a second thought.