Google patches bug that allows attackers to slip past two-factor authentication

Status
Not open for further replies.

Jack

Administrator
Thread author
Verified
Staff Member
Well-known
Jan 24, 2011
9,378
Sophos said:
Google's two-step verification, according to the company's ad campaign, isn't merely a bear guarding your home. It's a snake pit behind the bear guarding your home.

Unfortunately, it turns out, application-specific passwords allow attackers to bounce right past the bear and to hop over the vipers.

According to Duo Security, attackers could - until a fix was issued last Thursday, that is - bypass Google accounts' two-step login verification, reset a user's master password, and gain full profile control, just by capturing a user's application-specific password (ASP).

Duo Security first spotted the ASP bug in July 2012, Adam Goodman said in a blog posting on Monday.

Google pushed out a fix that prevents these ASP-initiated hijackings last Thursday.

The bug's existence points to how challenging it can be to set up wide-scale, comprehensive deployment of strong authentication, Goodman writes.

To make two-step verification usable for all, and to glue it onto what was already a complicated, sprawling ecosystem, all without breaking any moving parts, Google engineers had to compromise in a few spots.

That's how ASPs came to be.

Read more: http://nakedsecurity.sophos.com/2013/02/28/google-patches-bug-that-allows-attackers-to-slip-past-two-factor-authentication/
 
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top