Saturday, April 21, 2018

Numeric passwords ‘extremely weak’, can be easily cracked, say cybersecurity experts

Experts say that passwords using just numbers, such as those required by Singapore Airlines' KrisFlyer and Qantas’ Frequent Flyer programmes, can be easily cracked using methods like brute-force attacks.
Read more at https://www.channelnewsasia.com/news/technology/numeric-passwords-extremely-weak-can-be-easily-cracked-say-10158938
 (Updated: )

Ricky Lim · 
Ms Sherie Low told Channel NewsAsia that Krisflyer should update its security system, which requires members to log in with their membership account number and a six-digit personal identification number (PIN).
"At the very least it should be protected with a one-time password," she said. "They cannot have such a flimsy system that allows hackers to get into accounts so easily and also add nominees so easily."
==
Posted on :-18 Apr 2018

Ricky Lim ·
Singapore
For eCommerce transaction, it is imperative for Corporation to adopt 2FA to prevent phishing attacks.

So that when hackers manage to phish userid and passwords from users - the hackers will not be able to perform eCommerce transactions - because it will need a 2FA to complete the eTransactions - as userid and passwords are not good enough.

As hackers will not have the SMS 2FA or secure-token generated random numbers - such phishing attack will not be successful.

SIA should seriously consider 2FA for eCommerce transactions.

The only problem is --- overseas members will have difficulty using 2FA - as SMS is need to use local telcos and distributing secured token to overseas members will be a challenge. (To mitigate this challenge, a 2FA generated number can be sent to the email of the overseas member).

Jeremey Wong
I am fine with just password but at least need longer password with all the nasty characters mandatory. Must have capital letter la, lower case la, numeric la and strange characters and must be minimum 12 characters for the password.

Ricky Lim ·
Singapore
Jeremey Wong - when a keylogger malware get into your end-device - whether smartphone or your laptop --- no matter how fantastic your password is - is useless.

Eg. a keylogger malware is loaded into your laptop - whatever you type - the keylogger will capture your keystroke one by one - and pipe back to hacker server who can later retrieve your userid and password.

If if you use OTP 2FA (One time password - 2-factor authentication) - even if the keylogger capture your keystroke on the 2FA - the hacker can't use it to login into your account because it is only valid once unlike your userid and password which are used everytime you login.

Ricky Lim ·
Moreover OTP 2FA (sms or secure token) - are randomly generated numbers that cannot be hacked by brute force - because it is time sensitive where the Authentication Servers time must synch with NTP (Network Time Protocol) - where the random generated numbers are only valid within a few minutes time frame that synch with Stratum 0 and 1 of atomic clock of the satellite.

Thus when hackers capture the 2FA - it will not be able to key in faster than the user, also if the user use it once, the hacker cannot use it the 2nd time and also the limited valid time limit to keyin the 2FA is too short for hacker to login.

So in short, 2FA is almost foolproof for eCommerce transaction - and is highly recommended for Corporations that offer eCommerce via the Web.

ビンオマール宗作
Ricky Lim 2FA only goes some way as a solution, but the weakest link is always the user. Did you notice how there are still successful hacking attempts of bank accounts even today with 2FA? A malware on the phone can intercept 2FA smses and send it to an attacker fast enough to let them enter an account, especially if the entire operation is automated. Secure tokens are costly to deploy, and are probably not worth it for SIA to deploy just to protect flyer miles, as they have to foot the bill, or pass it on to the end user. So although 2FA helps as part of a layered approach to security, it is not the silver bullet you make it out to be.

Ricky Lim ·
Singapore
ビンオマール宗作 - If you do your eTransaction with your laptop and receive your 2FA with your handphone - how do hackers reconcile the userid, password with the 2FA whereby laptop is going through internet and sms is going via phone network?

Both internet and voice network are 2 separate network.
Like · Reply · 1m

Ricky Lim ·
Unless you do your eTransaction using your smartphone - by keying in your userid and password and receiving the SMS 2FA on the same smartphone. Then 1 malware in your smartphone can capture both your user credential from Internet and your SMS 2FA from voice network that landed in the same smartphone.

This method is not recommended - because your Andrioid phone or iPhone - will not have sufficient protection as oppose to your laptop.

Security in Android or iPhone are weak - as compare to laptop personal firewall, anti-virus or anti-malware software or security updates.

Moreover, 2FA means using 2 separate devices - and not 1 smartphone to do eTransaction via Internet and receiving 2FA from the voice network in the same devices.

LikeReply1m
Ricky Lim · 
Or if a laptop use a soft-token resided in the laptop instead of a separate hard token or a soft-token resided in the user smartphone. Then 1 malware in your laptop can capture both your user credential from Internet and your soft-token 2FA that is generated and landed in the same laptop.
Like · Reply · 1m

Ricky Lim ·
Singapore
But if you insist on using smartphone and not laptop to do eTransaction, can and still be safe.

(1) Use 2 smartphone or 1 smartphone and 1 tablet.
(2) Use 1 smartphone or 1 tablet with wifi to access Web page via Internet, key in your wser id and password.
(3) Receive your 2FA SMS via another smartphone via your SIM LTE connection through the voice network (not through internet).
(4) key in 2FA in the 1st smartphone or 1 tablet - and complete the web transaction.

Foolproof - Silver bullet !
Like · Reply · 1m

Ben Loho ·
University of Wisconsin-Madison
Ricky Lim, I agree with you. SIA should adopt 2FA. It's now common practice in the US for almost all finance-related transactions.
Like · Reply · 8h

Ricky Lim ·
Singapore
Ben Loho - Yes 2FA is safe if used correctly.
Also it will help to protect SIA customers as well as SIA - from suffering any financial loss or loss in reputation due to hackers' action.
LikeReply1m

Ricky Lim · 
“By implementing multi-factor authentication, biometrics such as a fingerprint or retina scan as well as facial recognition can be used as forms of authentication before sensitive transactions can be completed,” he said.
---
Using fingerprint or retina scan --- are also another 2 good 2FA method for security - because they are unique and hackers cannot hack and steal it.

But there are 2 problems :-
(1) Users must have fingerprint or retina scanner in their smartphone or laptop - do the 2FA - if not cannot work.

(2) Sometimes fingerprint if finger is wet or dirty - the 2FA may not work --- as some experience this in using their smartphone or laptop.
LikeReply1m



ビンオマール宗作
Ricky Lim You forgot to consider the fact that there is hardly anyone who does not connect their smartphone to their computer to sync. You can sideload android malware into the phone that way from an infected computer.
LikeReply4h


Ricky Lim · 

ビンオマール宗作 -

(1)Home Laptop generally have a higher security (than smartphone) as it usually come with:-
a. Personal firewall
b. Most Operating System such as MS Windows 8, 10 - are cloud-based O/S - whereby Microsoft will download security patches and updates periodically to patchup any vulnerabilities or any security breaches.
c. Anti-malware, spyware, anti-viruses software that periodically scan the laptop for unusual infection.
Thus the chances of laptop being infected are quite rare.

For corporate laptop - security is even higher eg. :-
a. Some corporate adopt BYOD (Bring-Your-Own-Device) and MDM (Mobile Device Management) - to perform security posture assessment everytim a laptop login to enhance corporate security policy like checking firewall, anti-virus, virus scanning on login etc security assessement before a user can use the laptop.
b. Corporate laptop will encompass all the above home laptop security feature.
c. Lockout all laptop system files to ensure read-only - so that virus or malware are not able to infect the laptop by writing or amending system files.
d. Thin client or corporate VM clone that separate data files from system or application files to prevent cross infection.
e. USB port restriction to authorised USB devices.
Thus the chances of corporate laptop being infected is even more rare.

(2) SMS OTP use a different network from Internet network.
SMS OTP use the analogue voice network whereas Internet network use digital router base network.
When transaction are done via Internet in the laptop, it will not be aware that SMS OTP are drop into the smartphone via voice network where SMS is not browser based.
However if malware is transfer from laptop to smartphone - there is a possibility that malware in laptop can communicate with hacker server and the hacker server can communicate with the android malware in the smartphone 
(which require very good precision synch between the 2 in a very short period of a few minutes) to capture the SMS OTP.

This circumstances will arise only if 2 malware (1 in laptop and 1 in smartphone are both active at the same time to synch with the hacker server).
If the laptop has higher security and able to detect, quarantine or remove the malware in the laptop, then the synch to smartphone malware to capture the SMS OTP will not be possible.

(3)Service Provider eg. bank will drop sms to the user smartphone for any eTransaction (eBanking) - taken place via its website - normally notifying the time, the amount transfer, the account to which the money is transfer and the person account number to which the money is transfer.
Thus SIA can use similar method to alert the user of any eWeb transaction taking place --- so that if any hacker try to steal the Krisflyer mileage - user straight away is aware and can alert SIA to stop the transaction.

(4) Banks are even safer because in addition to SMS OTP, money transfer or bill payment will also need a secure token generated number to complete the transaction in addition to userid and password. This is a multi-authentication eTransaction.
Thus the chances of hackers stealing and the success in eWeb - are extremely rare in a 2FA eTransaction.
LikeReply1mEdited

Ricky Lim · 

In short - the chances of hacker stealing money or krisflyer mileage from a user ---- is very low, very low and can be detected straight away ---- and it require a very sophisticated hacker to do it --- but will still get detected right away.

Thus 2FA, and even multi-authenticated FA - are still very widely used in banking and financial sector worldwide and in some Government.
LikeReply1m
Ricky Lim · 

ビンオマール宗作 --
In short - the chances of hacker stealing money or krisflyer mileage from a user ---- is very low, very low and can be detected straight away ---- and it require a very sophisticated hacker to do it --- but will still get detected right away.

Thus 2FA, and even multi-authenticated FA - are still very widely used in banking and financial sector worldwide and in some Government.
LikeReply1h

Ricky Lim · 

ビンオマール宗作 --

After saying so detail on the above security - I still cannot see how the 2FA can be breach even if laptop malware are copied to the smartphone malware.

(1) If a user keyin the userid and password in the web (internet) via laptop ---- the transaction is "locked" --- even if the hacker are notified by laptop malware that an eWeb is done - and to prepare to receive the SMS OTP from the smartphone malware --- the hacker cannot do anything ---- because the userid and password is "locked" - and hacker cannot use back the same userid and password.

(2) When the SMS OTP is received by the user smartphone, this SMS OTP will be useless to the hacker as the userid and password is "locked".
It can only be used by the user.

So there is no way the hacker can steal away the user money or krisflyer mileage.

To conclude :-
Even if laptop and smartphone are infected by the same malware, hacker still cannot hack --- because SMS OTP will only land in user smartphone and the hacker will still be one step late.

So Foolproof - Silver bullet !

Sigh --- why post so much detail security --- waste time.
LikeReply1m

ビンオマール宗作
Ricky Lim Don't come up with pseudoscience please. Cyber security is my rice bowl, as someone who has multiple IT security certifications and been in this field for over 10 years, I can tell that you have no idea what you are really talking about.
LikeReply8m
Ricky Lim · 

ビンオマール宗作
--
OK then highlight how you achieve the breach - since you say you are so good in cybersecurity --- and you seems to be better than those security experts who published this article.


Talk no use. Show.
LikeReply1m


ビンオマール宗作
Ricky Lim I don't really need to, actually, coz anyone with a proper cybersecurity background knows that a fundamental rule of IT security is that there is no such thing as absolute security. You can go look that up. Your sweeping assumptions and statements on security are the kind that causes fake news, and can cause harm to others due to the false sense of security such statements derived from what are clearly personal opinions and not proper facts can create. In fact I should be the one challenging you to find a qualified cybersecurity professional out there to see if your generalisations and assumptions hold water.
LikeReply12m
Ricky Lim · 

ビンオマール宗作
--- there is no absolute security in IT I agree - where TCP/IP can be compromised with very determined and sophisticated hackers.

In pushing for eTransaction and eCommerce in a Smart Nation - one will do what best to secure the transaction --- as what this article is about and the best practices adopted by banking and financial sector around the world including in many Government transactions.

But since you proclaim yourself as cybersecurity expert and unable to show how the 2FA and multi-authentication can be breach ---- then this shows that 2FA and multi-authentication will still be the practical proven practice for Web transaction.

This is the message i want to deliver --- until and unless you can prove otherwise.
LikeReply4m
Ricky Lim · 
And i will be very happy if anyone on the Web can prove me wrong.
Ego is the least i am concern about. Flaunting certification is the least i am concern about. The best hackers could be just some whizkid that don't even have a cert.

Outcome is what it matters.

Then the whole industry will relook at even safer method to secure the Web transaction.
As of now, this article 2FA, multi-authentication method - will still stand effective for eTransaction.
LikeReply1mEdited

ビンオマール宗作
Ricky Lim straitstimes[dot]com/singapore/association-of-banks-in-singapore-issues-alert-on-malware-targeting-android-phone-users see for yourself. Either Straits Times is giving fake news, or you are.
LikeReply11m

ビンオマール宗作
See which part of "At this point, the malware takes over control of the smartphone and intercepts the one-time password (OTP) sent via SMS to the phone for committing fraudulent transactions." do you not comprehend. 2FA can be broken and intercepted. Not even going to bother to write a PoC exploit just for you as that would be a waste of my time.
LikeReply12m
Ricky Lim · 

ビンオマール宗作
--
I think you are trying to confuse the readers here.

The report make about the breach is about - eBanking breach through smartphone mobile apps and SMS OTP receive in the same mobile apps - that i have highlighted in my first breach scenarios.
You can re-read the whole scenario again.

It does not apply to what is recommended in my later 2 scenarios - using 2 separate devices --- as well as what this article recommend.
--
I paste the Straits Times article here in case you does not understand the scenario.

Banks in Singapore reports malware attacking its customers through WhatsApp
Posted: December 1, 2015 By: Rory Lee No comments

151201-whatsapp

A report by the Singapore Straits Times reveals that there is malware lurking within WhatsApp‘s update that can affect Android devices. According to the Association of Banks in Singapore (ABS), this update was not initiated by the app maker and has been infecting Android devices in Singapore over the past few months.

After the “update” has been downloaded, the malware will prompt the user to enter confidential information, such as credit card details. Then the malware would take over the affected device and intercepts the one-time password (OTP) sent via SMS to the phone for committing fraudulent transactions.

“Criminals have been targeting computer users, but now criminals have turned to targeting Android phone users as banks are pushing out more banking apps for user convenience,” said ABS director Ong-Ang Ai Boon. It turns out convenience really is becoming the downfall of humanity as we continuously rely on our devices to carry out daily activities.

According to Channel NewsAsia, this vulnerability extends beyond just WhatsApp as they claim the malware is disguising itself as an operating system update as well. They reported that about 50 smartphone users have been hit by malware targeting mobile banking customers in the last three months. Besides disguising itself as a WhatsApp update, it also reportedly masquerades as an operating system update for the battery management module.

Channel NewsAsia also reports that ABS estimates the average amounts lost by the victims who are customers of major retail banks in Singapore were “a couple of hundred of dollars”, although some victims could have lost several thousand dollars through multiple transactions. The source of these fraudulent transactions appear to originate from Eastern Europe and includes purchases of budget airline tickets.

“Jailbroken iPhones or rooted Android [devices] are vulnerable…and in particular Android, because that phone system involves easier download of third-party apps,” said Ong-Ang. The silver lining is that ABS states that banks may refund victims on a case-by-case basis depending on whether or not the victim took the necessary precautions to protect themselves from such attacks.

Singapore is awfully close to our home soil of Malaysia, so please be warned and double check your updates before installing them. At the time that this article was written, there has been no official announcement on this matter posted on WhatsApp’s Facebook page, Twitter or Blog. So the moral of the story here is, please make sure that your application updates come directly from the Google Play Store.
LikeReply1m

ビンオマール宗作
Ricky Lim Why would I want to confuse users? Just admit it. You don't have sufficient knowledge in this field and are just writing a wall of text based entirely on your own opinions. If you think you have a unhackable solution, I challenge you to go ahead and sell it. Would make you a millionaire. If your flawed security concepts stand to proper scrutiny that is.
LikeReply3m
Ricky Lim · 

ビンオマール宗作
--
This is exactly the 1st scenario that i have highlighted --- if it is too much for you to read or understand :-

"Unless you do your eTransaction using your smartphone - by keying in your userid and password and receiving the SMS 2FA on the same smartphone. Then 1 malware in your smartphone can capture both your user credential from Internet and your SMS 2FA from voice network that landed in the same smartphone."
LikeReply1m

Ricky Lim · 
ビンオマール宗作
-- As for your comments :-
"Ricky Lim Why would I want to confuse users? Just admit it. You don't have sufficient knowledge in this field and are just writing a wall of text based entirely on your own opinions. If you think you have a unhackable solution, I challenge you to go ahead and sell it. Would make you a millionaire. If your flawed security concepts stand to proper scrutiny that is."

---
Ha ha ha -- you will be very surprise that you are using it many times for years --- and you may not even know.

Or millions of people have been using it for years - and millions may not even know.

Bye Bye to you --- and will not respond to you anymore.
LikeReply1m



Numeric passwords ‘extremely weak’, can be easily cracked, say cybersecurity experts

Experts say that passwords using just numbers, such as those required by Singapore Airlines' KrisFlyer and Qantas’ Frequent Flyer programmes, can be easily cracked using methods like brute-force attacks.


















image: data:image/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==
Man types on a computer keyboard in front of the displayed cyber code in this illustration picture
A man types on a computer keyboard in front of the displayed cyber code in this illustration picture taken on Mar 1, 2017. (Photo: Reuters/Kacper Pempel)

SINGAPORE: Earlier this week, it was reported that a member of Singapore Airlines’ KrisFlyer frequent flier programme alleged her account was hacked and 76,000 miles were drained from it.
Ms Sherie Low told Channel NewsAsia that Krisflyer should update its security system, which requires members to log in with their membership account number and a six-digit personal identification number (PIN).
"At the very least it should be protected with a one-time password," she said. "They cannot have such a flimsy system that allows hackers to get into accounts so easily and also add nominees so easily."
SIA is currently investigating the incident, so it is not certain that Ms Low’s account was hacked into, and if so, whether it was because of vulnerability in the password. 
Asked to comment on its security measures, the airline said it takes the privacy of its customers' data "seriously" and takes all "reasonable measures" to ensure their information remains safe and protected, as well as carry out regular reviews to continue providing a secure online platform for its customers. 
SIA also repeated its advice to customers to take measures to prevent phishing, which it gave when asked to comment for the original article on Wednesday.These include changing passwords regularly, using antivirus and logging into their KrisFlyer accounts only through the official website.
KrisFlyer is not the only frequent flier programme that uses numeric-only passwords. Qantas’ Frequent Flyer programme, for example, uses a four-digit numeric PIN system as does Morocco’s national carrier Royal Air Maroc’s Safar Flyer scheme. 
Cybersecurity experts, though, told Channel NewsAsia that numeric passwords are “extremely weak”, and could potentially be cracked in minutes.
Mr Eugene Aseev, vice president of data storage and protection company Acronis, said in general, it would take “a few minutes on a regular PC to brute-force” a six-digit numeric password. Brute force attacks refer to an automated, trial-and-error method to decrypt passwords using an application.
For KrisFlyer, a 'three-tries' policy before users are locked out for 24 hour adds a layer of tedium for hackers, Mr Aseev said. “With a limited number of allowed log-in attempts, brute-forcing becomes quite tedious – and if you have to wait 24 hours before the next attempt, it could take a several months to hack into one’s account using this way.”
Another malware expert, Mr William Tsing from US-based cybersecurity firm Malwarebytes, shed more light on brute-force attacks.
The malware analyst pointed out that numeric passwords are easy to crack using modern resources. He cited the example of a tool called GrayKey, which unlocks iPhones and can break into a six-digit code within 11 hours.
“Depending on how the code is stored, that time to crack can be lower,” Mr Tsing said.
MULTI-FACTOR AUTHENTICATION MOOTED
So what could airlines do to improve the security of their frequent flier programmes? Especially since one’s frequent flier miles have a monetary value, given that credit card points can be used to convert to these miles and vice versa. There are also online sites that purport to buy these air miles from customers.
Mr Sumit Bansal, managing director of Sophos in ASEAN and Korea, said one way these organisations can strengthen security is to deploy multi-factor authentication. This means users need to authenticate their credentials more than once in order to access their accounts.
“It is an essential layer but not many sites implement it equally – some do so more securely than others,” he pointed out.
This suggestion was reiterated by Mr Shashwat Khandelwal, head of Southeast Asia consumer business at McAfee.
“By implementing multi-factor authentication, biometrics such as a fingerprint or retina scan as well as facial recognition can be used as forms of authentication before sensitive transactions can be completed,” he said.
Malwarebytes’ Tsing also suggested that SIA and the other airlines using numeric passwords should change their policy and allow users to create longer passwords containing other characters.
“To better protect consumers, a minimum of 12-digit password that includes letters, numbers, and special characters should be required, and the password shouldn’t have an upper limit on characters.”
Source: CNA/kk
Read more at https://www.channelnewsasia.com/news/technology/numeric-passwords-extremely-weak-can-be-easily-cracked-say-10158938

No comments:

Post a Comment