Greater Than One. Defeating strong authentication in web applications. - Brendan O Connor

Two-Factor Authentication in Internet Banking

Document information

Language English
Format | PDF
Size 344.26 KB

Summary

I.Inadequate Single Factor Authentication in Internet Banking

This section highlights the insufficiency of single-factor authentication for high-risk online banking transactions involving customer information access and fund transfers. The document emphasizes the need for stronger multi-factor authentication (MFA) or two-factor authentication (2FA) methods to mitigate risks associated with online banking security and online fraud prevention.

1. Federal Financial Institution Examination Council s Assessment of Single Factor Authentication

The Federal Financial Institution Examination Council considers single-factor authentication insufficient for high-risk online banking transactions. They explicitly state that single-factor authentication, as the sole security mechanism, is inadequate to protect against unauthorized access to sensitive customer information or the movement of funds. This assessment underscores the need for more robust security protocols. The council does not mandate two-factor authentication but clearly indicates that more than one factor is necessary. The document also notes that while hardware tokens represent a potential solution, their expense and susceptibility to loss or damage present practical challenges. Access to customer information or the movement of funds is prevalent in nearly every aspect of internet banking applications, highlighting the pervasive nature of this security concern.

2. The Limitations of Existing Authentication Methods

The document delves into several existing authentication methods, revealing their inherent limitations. Mutual authentication, while mentioned, isn't explored in detail within this section. One-Time Passwords (OTPs), while offering increased security compared to device fingerprinting, still suffer vulnerabilities like man-in-the-middle attacks, especially when delivered via email or SMS, establishing predictable patterns for attackers to exploit. Furthermore, OTPs do not adequately address fraud or identity theft issues. Knowledge-Based Authentication (KBA), reliant on publicly available information, is even less effective, readily susceptible to exploitation through response analysis. The section also touches on the 'bolt-on' approach to enhanced authentication, often implemented through third-party integrations, and contrasts this with the superior 'build-in' approach where security features are integral to application design. This discussion sets the stage for a critical evaluation of prevalent authentication techniques and their inadequacies in safeguarding internet banking systems. The need for more robust and holistic security solutions is strongly implied.

3. Hardware Tokens and their Practical Drawbacks

The document briefly mentions hardware tokens as a potential solution for enhancing security in online banking transactions. However, it immediately points out the significant drawbacks associated with their use. Hardware tokens are described as expensive, easily lost, and prone to physical damage. This analysis underscores the practical limitations of relying solely on hardware tokens for robust authentication, suggesting the need to explore alternative and more resilient security strategies. The high cost and fragility of these tokens make them a less-than-ideal solution for widespread implementation in online banking, adding another layer to the complexity of finding effective security measures that balance protection and practicality.

II.Analysis of Different Authentication Methods

Several authentication methods are analyzed: One-Time Passwords (OTPs), while better than device fingerprinting, are vulnerable to man-in-the-middle attacks and train users towards trusting potentially malicious emails. Knowledge-Based Authentication (KBA), often used with persistent cookies, proves easily defeated. Device fingerprinting, although aiming for implicit authentication through device characteristics, is shown to be easily bypassed and replicated, increasing the risk of phishing attacks. The document advocates for a shift from device fingerprinting to analyzing user behavioral biometrics for more robust security.

1. One Time Passwords OTPs Strengths and Weaknesses

The document examines One-Time Passwords (OTPs) as an authentication method. While acknowledged as superior to device fingerprinting due to its reduced transparency, OTPs are not without flaws. The primary concern highlighted is the vulnerability to man-in-the-middle attacks, particularly when delivered via email or SMS. The predictability of email or SMS delivery creates patterns that attackers can exploit. A significant drawback is that, despite being a more secure method than others discussed, OTPs still fail to address the fundamental issues of online fraud and identity theft. This analysis reveals that while OTPs represent an improvement, they are not a complete solution to the complexities of online banking security, and their reliance on email or SMS actually entrenches user trust in these potentially vulnerable communication channels.

2. Knowledge Based Authentication KBA and its Limitations

Knowledge-Based Authentication (KBA), utilizing information from public records, is discussed as another authentication method. However, the document points out that KBA is significantly less effective than challenge questions and is vulnerable to being defeated even without prior knowledge of the user. This vulnerability arises from the ability to analyze responses and identify patterns, ultimately undermining the security it's meant to provide. KBA’s reliance on publicly accessible data fundamentally limits its effectiveness as a standalone security measure. The document highlights the need for more algorithmic and robust methods that are less susceptible to such attacks. The usual pairing of KBA with persistent cookies further raises concerns about data privacy and potential misuse. The relatively infrequent use of KBA, while noted, doesn't diminish its inherent vulnerabilities, reinforcing the conclusion that more effective authentication methods are needed.

3. Device Fingerprinting A Detailed Analysis of its Vulnerabilities

Device fingerprinting, a technique aiming to identify users based on their device characteristics, receives significant attention. The document dissects how the application gathers specific device information to create a fingerprint, detailing the process of capturing user agent strings and other device-specific data. However, the core issue lies in the ease with which current implementations can be bypassed or replicated. Attackers can manipulate parameters, exploit multiple servers and redirects, and leverage the client's own state to mimic legitimate users. The analysis reveals that all implementations of this system share a common alt tag for each image, leading to a shared catalog of images across multiple applications. This shared image catalog simplifies the task of mirroring the entire image catalog, thereby increasing the vulnerability of the system. The conclusion underscores that device fingerprinting, in its current form, does little to hinder online fraud and provides a false sense of security.

4. Proposed Improvements and Alternative Approaches

The document suggests a shift from device fingerprinting to focusing on behavioral biometrics, suggesting that analyzing user behavior rather than just device characteristics could provide a more resilient security measure. However, the sheer volume of data involved, and the prevalence of malware like Trojans and Browser Helper Objects (BHOs), present challenges to implementing such a system securely. The report also warns about the potential for malware to replace transactions 'on the fly,' further complicating security. Finally, the document advocates for a positive authentication model, emphasizing the need for strong authentication for all new transactions and incorporating hash values for transaction integrity. This recommendation aims to address the inadequacies of existing methods and emphasizes a proactive approach towards security, highlighting the importance of secure implementation.

III.Vulnerabilities of Device Fingerprinting

The analysis reveals significant vulnerabilities in current device fingerprinting implementations. Attackers can easily bypass or replicate fingerprints, rendering the method ineffective against sophisticated threats. The shared image catalog across different applications using this system further exacerbates the risk, significantly increasing the ease of phishing attacks and spear-phishing. The inherent limitations of device fingerprinting do absolutely nothing to prevent online fraud; the inheritance trust model still applies, leaving the system vulnerable after successful authentication.

1. Bypass and Replication of Fingerprints

A central vulnerability of device fingerprinting is its susceptibility to bypass and replication. The document details how attackers can manipulate fingerprinting parameters to determine failure thresholds, making it possible to circumvent the system. The use of multiple servers and redirects, coupled with the client maintaining state, further exacerbates this vulnerability, as attackers can effectively mimic legitimate user behavior. This ability to replicate fingerprints renders the system ineffective against sophisticated attacks, highlighting a critical design flaw. The analysis demonstrates that the current implementations of device fingerprinting are easily compromised, emphasizing the need for improved security measures to protect against such threats. The ease with which this can be accomplished severely undermines the effectiveness of this authentication method.

2. Shared Image Catalog and Phishing Vulnerabilities

The document reveals a significant vulnerability stemming from a shared catalog of images across multiple applications using the device fingerprinting system. All implementations share the same alt tag for unique images, making it trivial for an attacker to mirror the entire image catalog by gaining access to just one application. This weakness directly facilitates phishing attacks, allowing attackers to create highly convincing phishing campaigns targeting specific organizations. The attacker simply needs to copy the relevant visual elements to create a seemingly legitimate login page. This vulnerability significantly lowers the barrier to entry for phishing attacks, increasing the risk of successful attacks and emphasizing a systemic design flaw that needs to be addressed. This shared resource simplifies the creation of convincing phishing attempts, posing a serious threat to user security and data integrity.

3. Ineffectiveness Against Fraud and the Inheritance Trust Model

The document explicitly states that device fingerprinting does absolutely nothing to stop fraud. The inheritance trust model remains in effect; once a user is authenticated, all transactions are considered valid, regardless of how the authentication occurred. This means that even if a fraudulent fingerprint is used, the system won't detect the malicious activity after initial authentication. Further compounding the problem, if the application doesn't enforce all authentication phases within a single session, the same vulnerabilities apply. Long or non-existent Time-To-Live (TTL) values for sessions exacerbate the risk of unauthorized access and malicious actions. This critical flaw highlights the fundamental ineffectiveness of device fingerprinting in preventing fraud, and underlines the need for a more comprehensive approach to secure online transactions. The inherent limitations expose a significant weakness in the security architecture, requiring a complete overhaul of the system’s approach to authentication and authorization.

IV.The Need for a Positive Authentication Model and Improved Security Practices

The document strongly advocates for a paradigm shift towards a positive authentication model, requiring strong authentication for all new transactions. This approach, coupled with transaction hashing to prevent tampering, aims to significantly improve Internet banking security. The report emphasizes the critical need for application vendors to integrate robust security measures from the outset ('build it in,' not 'bolt it on') to address the ongoing issues of phishing, fraud, and identity theft in online banking. The current situation leaves financial institutions and customers vulnerable, incurring significant losses due to inadequate security measures and a false sense of security.

1. The Urgent Need for a Positive Authentication Model

The core argument presented is the critical need to adopt a positive authentication model for online banking security. This model necessitates strong authentication for every new transaction, moving away from relying on the implicit trust of existing sessions. The document suggests employing hash values of transactions to prevent tampering, adding an extra layer of security against manipulation. This proactive approach stands in stark contrast to the reactive measures currently employed, which often fail to address the root causes of security breaches and online fraud. The implementation of this model requires a fundamental shift in the way security is approached, moving from a system that primarily reacts to breaches to one that actively prevents them from occurring in the first place. The proposal highlights the shortcomings of existing approaches, emphasizing a preventative methodology rather than a reactive one.

2. Addressing the Shortcomings of Current Security Practices

The document critiques the current state of online banking security, noting that many technologies deployed fail to address the core problems of phishing, fraud, and identity theft. There's a strong emphasis on the need for application vendors to fundamentally change their approach – 'build it in, not bolt it on'. This highlights the inadequacy of simply adding security features as afterthoughts rather than designing them into the system from its inception. This criticism extends to the false sense of security often conveyed to end-users by insufficient security measures, sometimes even leading to a net decrease in security. The current cycle of complaints about fraud and ineffective technology underscores the critical need for a paradigm shift toward proactive and integrated security solutions. The financial industry's current practices, where financial institutions bear the brunt of losses from compromised accounts, are shown to be unsustainable and drive the need for a significant change in the underlying approach to security architecture.

3. The Financial Industry s Loss and the Cycle of Inaction

The document details the financial consequences of inadequate online banking security, emphasizing that financial institutions (FIs) absorb the costs when customers lose their checkbooks or credit cards. This highlights the imbalance between regulatory requirements and practical solutions. The government's role in regulation and legislation is acknowledged, but the document points to the private sector’s tendency to meet minimum legal requirements without fully addressing the real problem. This creates a cycle where people continue to experience phishing, fraud, and identity theft, yet many deployed technologies fail to effectively address these issues. The conclusion reinforces the idea that the current system is unsustainable, with the costs falling disproportionately on the financial industry. This unsustainable model necessitates a fundamental shift from reactive measures to proactive and comprehensive security strategies deeply integrated into the design of online banking systems.