Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Phishers crack token-based security

Man-in-the-middle attack spreads.

Article comments

Scammers have found a way around new token-based authentication systems that have been adopted by some banks.

Over the past few weeks, approximately 35 phishing Web sites have been set up that use the new attack. They attempt to trick users into divulging the temporary passwords created by the security token devices used by banks such as Citigroup, said Rich Miller, an analyst with Internet research company Netcraft.

Phishers have only recently begun looking for ways around token authentication, using what is known as a "man-in-the-middle" attack, Miller said. "These attacks are worrisome because they took advantage, fairly early on, of a system that's seen as enhancing security for banking customers," he said.

Token devices are used to create a temporary second password for online banking customers. These passwords are valid for a very short period of time and can be used only once, making it impossible for attackers to steal them for later use.

U.S. banks have been offering the tokens to users in an effort to comply with federal guidelines that call for stronger, two-factor authentication for online transactions by year's end.

Security experts had predicted that phishers would eventually use a man-in-the-middle attack to circumvent token-based authentication, but these recent attacks mark the first time they have actually done so, Miller said.

Under an ongoing attack against Citibank customers, phishers have set up a fake Web site where victims are tricked into entering their passwords. The fake site instantly forwards the password information to Citibank's real Web site, allowing the criminals to sign on before the victim.

With a total of 35 such phishing sites now spotted, it seems that the attack is becoming widespread, Miller said. "This is getting organised," he said.

"It is not just an isolated incident of somebody coming up with a proof of concept or an exploit that's unique to them."

Many of the 35 phishing sites found by Netcraft have now been shut down, although some are still in operation, Miller said.

Although these new phishing techniques show that no technique is impervious to attack, token-based two-factor authentication remains a useful tool against malicious software such as Trojan horse programs, said Johannes Ullrich, chief research officer at the SANS Institute.

Ullrich also noted that these attacks rely on victims who will enter sensitive information into an untrusted Web site, a type of victim that is becoming harder to find as users clue into the phishing phenomenon.

"The real problem is not the phishing sites; it's the Trojans and keyloggers," he said, adding that "they'll have a harder time working around the two-factor authentication."



Share:

More from Techworld

More relevant IT news

Comments



Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map

* *