101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

483
active users

#authy

0 posts0 participants0 posts today
Continued thread

There are different articles floating on the internet of people who've experienced the same as I have. For no reason, without any warning, you cannot uninstall authy anymore on your device.

If you do a few things will happen; one of them is that after installation it will not allow you to get an SMS from your mobile phone, or it will allow that, but you will not be able to add any new accounts.

In either case the program has become worthless and you will get no warning ⚠️

Have you started migrating your authy MFA 2FA accounts to open source MFA clients?

¡¿No?!

Please start asap. The company has quietly been changing things with this important program and since they do not allow you to export your accounts easily, you will be in a situation where you have to systematically migrate the most important account you have to open source clients

At a certain point authy will stop working even on your new Androids without explanation no **fucks given**

New #blog post: Moving my #TOTP tokens from #Authy to #Aegis

In 2020, I moved my #2fa tokens from Google Authenticator to Authy. Unfortunately, Twilio have since changed things, undermining the reason that I'd chosen Authy in the first place.

I wanted the replacement to be #FOSS and after a bit of searching around, settled on Aegis Authenticator.

This post talks about why/how and what the benefits so far are.

bentasker.co.uk/posts/blog/gen

www.bentasker.co.uk · Moving my 2FA Codes from Authy to Aegis
More from Ben Tasker

@neff Because I have a lot of 2FA codes in Authy, they all trigger when I've unlocked the app and I find too many visuals a bit overwhelming - especially as they're all on a countdown the moment I've unlocked it! It's a personal thing though, I'm not saying #Authy is bad as a solution.

I want to know I can hit "generate" then look at my monitor, with more than 10 seconds of my countdown left.

With that, and currently no darkmode, I'm switching. Personal preference though.

Ugh, #Authy changed their android app and now there's always a code being generated, or worse, all accounts in the app are generating codes.

As far as I can see you can't revert back to the more logical "choose the system I ACTUALLY want a code for" screen.

Anyone else using Authy for #2FA knows if there's a way to be less bombarded by codes when opening the app?

In *2019*, Alex Weinert of Microsoft wrote in techcommunity.microsoft.com/t5:

«
    MFA had failed.

    [...]
    All Authenticators Are Vulnerable
    [...]
»

Today, as echoed in bleepingcomputer.com/news/micr, Microsoft still insists that using weak MFA is a good idea.

In azure.microsoft.com/en-us/blog Microsoft writes (on August 15):

«
As recent research [1] by Microsoft shows that multifactor authentication (MFA) can block more than 99.2% of account compromise attacks, making it one of the most effective security measures available, today’s announcement brings us all one step closer toward a more secure future.
»

From that same article, "solutions" with (nearly as weak as SMS) "Microsoft Authenticator" is at the TOP of their list:

«
Organizations have multiple ways to enable their users to utilize MFA through Microsoft Entra:

• Microsoft Authenticator [...]
• FIDO2 security keys [...]
• Certificate-based authentication [...]
• Passkeys [...]
• Finally, and this is the least secure version of MFA, you can also use a SMS or voice approval [...]
»

From [1] (PDF) = query.prod.cms.rt.microsoft.co , no date of the "investigation period" to be seen *anywhere*, and one of the authors being Alex Weinert, more extreme percentages (approved by Microsoft's marketing dept):

«
Our findings reveal that MFA implementation offers outstanding protection, with over 99.99% of MFA-enabled accounts remaining secure during the investigation period. Moreover, MFA reduces the risk of compromise by 99.22% across the entire population and by 98.56% in cases of leaked credentials.
»

Dear reader: please stop buying Microsoft BS that completely ignores PhaaS.

To name a few examples:

🚨 "Experts agree [*] that setting up two-factor authentication (2FA) İs one of the most powerful ways to protect your account from getting hacked. However, hackers like COLDRIVER and COLDWASTREL may try to trick you into entering your second factor; we have seen attackers successfully compromise a victim who had enabled 2FA." - (PDF) accessnow.org/wp-content/uploa

[*] Not me. My tip is here: infosec.exchange/@ErikvanStrat

🚨 EvilGinx2: "Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication" - github.com/kgretzky/evilginx2 (there are more, like Modlishka, Muraena, CredSniper, EvilProxy (Phaas), NakedPages etc.)

🚨 Not even a fake website needed: bleepingcomputer.com/news/secu

🚨 From mrd0x.com/attacking-with-webvi:
«
Bypass 2FA
WebView2 also provides built-in functionality to extract cookies. This allows an attacker to extract cookies after the user authenticates into the legitimate website. This technique removes the need of having to spin up Evilginx2 or Modlishka but the obvious trade-off is that the user must execute the binary and authenticate.
»
In addition, from bleepingcomputer.com/news/secu:
«
"Yubikeys can't save you because you're authenticating to the REAL website not a phishing website."
mr.d0x
»
AND:
«
However, as mr.d0x admits and Microsoft pointed out in their response to our questions, this attack is a social engineering attack and requires a user to run a malicious executable.
»
Correct, but a local compromise does'nt protect you when you're using FIDO2 hardware keys or passkeys.

🚨 From 2022: microsoft.com/en-us/security/b:
«
A large-scale phishing campaign that used adversary-in-the-middle (AiTM) phishing sites stole passwords, hijacked a user’s sign-in session, and skipped the authentication process even if the user had enabled multifactor authentication (MFA).
»

🚨 "Phishing with Cloudflare Workers: Transparent Phishing and HTML Smuggling" - netskope.com/blog/phishing-wit

🚨 "New EvilProxy Phishing Service Allowing Cybercriminals to Bypass 2-Factor Security" - thehackernews.com/2022/09/new-

🚨 From europol.europa.eu/media-press/:
«
The investigation uncovered at least 40 000 phishing domains linked to LabHost, which had some 10 000 users worldwide.
[...]
LabRat was designed to capture two-factor authentication codes and credentials, allowing the criminals to bypass enhanced security measures.
»

🚨 "Security and Privacy Failures in Popular 2FA Apps" by Gilsenan et al. (USENIX 2023): usenix.org/conference/usenixse
The PDF can also be found here: github.com/blues-lab/totp-app- (Aegis was one of the least problematic apps, and don't use Authy).

This is what is wrong with weak MFA/2FA:

You
 o
/|\  [device + browser]
/ \ |
v
[login.microsoftonline-aitm.com]
|
v
[login.microsoftonline.com]

(no thanks to DV-certificates).

TECHCOMMUNITY.MICROSOFT.COMAll your creds are belong to us!Multi-factor Authentication (MFA) matters. 
#AitM#MitM#EvilProxy

I'm very worried about what Authy did in regards to GrapheneOS (not intentionally I hope) not just because it's bad, but because it might be a hint for banking apps to switch into the same design massively. And while at least you could replace 2FA apps with other alternatives, banking is much harder to do.

Such behavior against custom ROMs is irritating.

(Graphene's thread grapheneos.social/@GrapheneOS/)

GrapheneOS MastodonGrapheneOS (@GrapheneOS@grapheneos.social)https://arstechnica.com/gadgets/2024/07/loss-of-popular-2fa-tool-puts-security-minded-grapheneos-in-a-paradox/ The article unfortunately leaves out most of the points we made in the thread. GrapheneOS supports hardware-based attestation and it's entirely possible for Google to allow it as part of the Play Integrity API. They choose to ban using GrapheneOS.