How Google Authenticator made one company’s network breach much, much worse | Ars Technica
When MFA isn't actually MFA
Cisco Confirms Network Breach Via Hacked Employee Google Account | Threatpost
Google Authenticator’s new syncing feature raises security concerns | SC Media
How Google Authenticator Made One Company's Network Breach Much, Much Worse - Slashdot
8 of the Best Google Authenticator Alternatives - Make Tech Easier
What are the vulnerabilities of using software-based one-time passwords (OTPs) for multi-factor authentication (MFA)?
While software-based one-time passwords (OTPs) are commonly used for multi-factor authentication (MFA), they are not without vulnerabilities. One vulnerability is the risk of data leakage and account takeover. In the case of Retool’s security breach, the attackers exploited the syncing feature of Google Authenticator, which allowed them to access the MFA codes stored in the employee’s Google Authenticator. This highlights the risk of storing sensitive authentication codes in the cloud. Additionally, software-based OTPs can be susceptible to phishing attacks. If an attacker is able to trick a user into inputting their OTP on a fake website or application, they can gain unauthorized access to the user’s account. This emphasizes the importance of user education and awareness to recognize and avoid phishing attempts.
How can organizations mitigate the risk of social engineering attacks in the future?
To mitigate the risk of social engineering attacks in the future, organizations should take a multi-pronged approach. First, they should prioritize employee education and awareness training. Employees should be trained on how to recognize and respond to social engineering tactics, such as phishing emails, phone calls, and text messages. This training should also emphasize the importance of verifying the legitimacy of requests for sensitive information before providing it. Second, organizations should implement strict access controls and authentication processes. This includes strong password policies, multi-factor authentication (MFA), and secure mechanisms for sharing sensitive information internally. Third, organizations should establish a culture of security and accountability. This involves creating clear policies and procedures around data handling and access, conducting regular security audits and assessments, and holding employees accountable for their adherence to security protocols. Finally, organizations should stay updated on the latest social engineering techniques and trends, and continuously adapt their security measures to counter evolving threats.
What measures should customers in the cryptocurrency industry take to ensure the security of their accounts?
Customers in the cryptocurrency industry should take several measures to ensure the security of their accounts. First and foremost, they should implement strong and unique passwords for all their accounts. This can be done by using a password manager to generate and store complex passwords. Second, customers should enable multi-factor authentication (MFA) whenever possible. This provides an additional layer of security by requiring a second form of authentication, such as a fingerprint or a code sent to their mobile device. Third, customers should regularly monitor their accounts for suspicious activity. This includes reviewing transaction history, checking for unauthorized access attempts, and setting up alerts for any changes or irregularities. Fourth, customers should be cautious when sharing personal information online, especially on social media platforms. Information such as their full name, date of birth, or address can be used by attackers to impersonate them or attempt identity theft. Lastly, customers should be vigilant against phishing attacks. They should verify the legitimacy of any emails, messages, or links before providing any sensitive information or clicking on them. By following these measures, customers can significantly enhance the security of their cryptocurrency accounts and protect their valuable assets.
Retool, a security company, recently experienced a major security breach that resulted in unauthorized access to customer accounts in the cryptocurrency industry. The breach started when a Retool employee clicked on a link in a text message claiming to be from the company's IT team. The employee provided a password and a temporary one-time password (TOTP) from Google Authenticator after logging into a linked site. To make matters worse, the employee received a phone call from someone claiming to be an IT team member and provided an additional multi-factor code. This series of events allowed the attackers to compromise not only the employee's account but also other company accounts.
II. The Security Breach
Retool immediately notified 27 cloud customers of the unauthorized access. The attack was the result of a spear phishing attack, where the attacker tricked an employee into logging into a fake internal identity portal. The attacker then called the employee and obtained an additional multi-factor authentication (MFA) code. With the MFA code, the attacker added their own device to the employee's Okta account, gaining access to all MFA codes stored in the employee's Google Authenticator.
III. The Attack Process
Using the stolen MFA codes and the Okta session, the attacker gained access to Retool's internal systems and executed an account takeover attack on a specific set of customers. Retool responded quickly, revoking all internal authenticated sessions, locking down access to affected accounts, and restoring the accounts to their original state. Thankfully, Retool's on-prem customers were not affected by the attack.
IV. Retool's Response
This breach highlights the vulnerability of using software-based one-time passwords (OTPs) for MFA. Google Authenticator's syncing of MFA codes to the cloud was a novel attack vector that the attackers exploited. Privacy advocates have criticized this feature, as it opens users up to data leakage and possible Google account takeover. Google should consider eliminating dark patterns in Google Authenticator or providing organizations with the ability to disable the sync feature.
V. The Vulnerability of Software-Based OTPs
Social engineering played a significant role in this attack. The attackers used techniques like voice phishing to trick employees into providing sensitive information. This incident serves as a reminder that preventive measures and systems should be in place to prevent human error from impacting overall system security.
VI. The Role of Social Engineering
To mitigate such attacks in the future, organizations should consider implementing hardware security keys, such as FIDO2, which provide resilience to threats. Technological solutions alone are not enough; human involvement is crucial for important actions.
VII. Mitigation Measures
Customers should also trust as little as possible and consider using Retool on-prem for increased security. Understanding their threat model and implementing necessary protections is essential for customers to safeguard their accounts. Furthermore, the industry as a whole needs to address the risks and issues highlighted by this attack.
VIII. Collaborating with Law Enforcement
Retool is collaborating with law enforcement and a third-party forensics firm to investigate the breach further. This incident serves as a wake-up call for companies to prioritize security and take proactive measures to protect customer data.
The recent security breach at Retool has raised concerns about the vulnerability of software-based one-time passwords (OTPs) and the role of social engineering in cyber attacks. This incident should serve as a wake-up call for companies in the cryptocurrency industry to prioritize security and take proactive measures to protect customer data. By implementing necessary protections and collaborating with law enforcement, Retool and other organizations can work together to prevent future breaches and safeguard customer accounts.