Is Real-time Phishing Eliminated with FIDO? Social Engineering Downgrade Attacks against FIDO Protocols
OPEN ACCESS
Loading...
Author / Producer
Date
2021-08
Publication Type
Conference Paper
ETH Bibliography
yes
Citations
Altmetric
OPEN ACCESS
Data
Rights / License
Abstract
FIDO's U2F is a web-authentication mechanism designed to mitigate real-time phishing-an attack that undermines multi-factor authentication by allowing an attacker to relay second-factor one-time tokens from the victim user to the legitimate website in real-time. A U2F dongle is simple to use, and is designed to restrain users from using it incorrectly. We show that social engineering attacks allow an adversary to downgrade FIDO's U2F to alternative authentication mechanisms. Websites allow such alternatives to handle dongle malfunction or loss. All FIDO-supporting websites in Alexa's top 100 allow choosing alternatives to FIDO, and are thus potentially vulnerable to real-time phishing attacks. We crafted a phishing website that mimics Google login's page and implements a FIDO-downgrade attack. We then ran a carefullydesigned user study to test the effect on users. We found that, when using FIDO as their second authentication factor, 55% of participants fell for real-time phishing, and another 35% would potentially be susceptible to the attack in practice.
Permanent link
Publication status
published
Editor
Book title
Proceedings of the 30th USENIX Security Symposium (USENIX Security 21)
Journal / series
Volume
Pages / Article No.
3811 - 3828
Publisher
USENIX Association
Event
30th USENIX Security Symposium (USENIX Security 2021)
Edition / version
Methods
Software
Geographic location
Date collected
Date created
Subject
Organisational unit
03755 - Capkun, Srdan / Capkun, Srdan