Mind your SMSes: Mitigating social engineering in second factor authentication
نویسندگان
چکیده
SMS-based second factor authentication is a cornerstone for many service providers, ranging from email service providers and social networks to financial institutions and online marketplaces. Attackers are not slow to capitalize on the vulnerabilities of this mechanism, using social engineering techniques to coerce users to forward authentication codes. We demonstrate one social engineering attack for which we experimentally obtained a 50% success rate against Google’s SMS-based authentication. At the heart of the problem is the messaging associated with the authentication code, and how this must not have been developed with security against social engineering in mind. Pursuing a top-down methodology, we generate alternative messages and experimentally test these against an array of social engineering attempts. Our most robust messaging approach reduces the success of the most effective social engineering attack to 8%, or a sixth of its success against Google’s standard second factor verification code messages.
منابع مشابه
Take Control Over your SMSes: A Real-World Evaluation of a Mobile-based Spam SMS Filtering System
In developing countries, Short Messaging Service (SMS) is one of the most widely used and cheapest modes of communication. Hence, this medium is often exploited by advertising companies to reach masses. The unsolicited (spam) SMSes consume user attention and have become a reason of annoyance for most of the mobile phone users, as not many of them use the information from these SMSes. We conduct...
متن کاملDevelopment and Preliminary Evaluation of Psychometric Properties of Symptom-Management Self-Efficacy Scale for Breast Cancer Related to Chemotherapy.
PURPOSE The purpose of this study was to develop and preliminarily evaluate the reliability and validity of the Symptom-Management Self-Efficacy Scale-Breast Cancer (SMSES-BC) related to chemotherapy. METHODS The study included three stages. This paper presents the results of stage 2 and stage 3. In total, 34 items in the SMSES-BC were found during stage 1 from qualitative findings, a literat...
متن کاملCompressed Image Hashing using Minimum Magnitude CSLBP
Image hashing allows compression, enhancement or other signal processing operations on digital images which are usually acceptable manipulations. Whereas, cryptographic hash functions are very sensitive to even single bit changes in image. Image hashing is a sum of important quality features in quantized form. In this paper, we proposed a novel image hashing algorithm for authentication which i...
متن کاملA Two Factor Authentication System for Touchscreen Mobile Devices Using Static Keystroke Dynamics and Password
The number of touchscreen mobile devices are rapidly increasing each day and so are the number of people that use them. Username-password combination is the most common method of authentication but has many vulnerabilities like shoulder surfing, social engineering, brute force attacks, key-loggers, etc. Keystroke Dynamics provides a novel approach to strengthen this existing method. Typing rhyt...
متن کاملImproving Performance of Mining Equipment Through Enhancement of Speed Factor: A Case Study (Research Note)
Loading and hauling machineries are highly capital intensive equipment to procure, operate and maintain in surface mining operation. It must be borne in mind that with this huge and capital-intensive equipment, every second of its life time is absolutely important from the production and productivity point of view. As such, it is imperative to optimize the overall cycle time and speed factor of...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computers & Security
دوره 65 شماره
صفحات -
تاریخ انتشار 2017