Site icon Tech Newsday

Google Authenticator syncing feature exposes 2FA credentials

According to security experts Tommy Mysk and Talal Haj Bakry, a new synchronization function in Google’s Authenticator 2FA software, which allows users to connect into numerous services, has a severe security issue. Mysk found the weakness, which is that “secrets” or credentials exchanged between devices are not end-to-end encrypted, allowing attackers or Google to read the credentials.

Christiaan Brand, Google Group Product Manager, Identity and Security, defended the software, claiming that it shipped as planned. However, because there is no end-to-end encryption, Google can see what services each account owner uses, potentially allowing the company to target personalized ads. Users are also vulnerable to attackers as a result of the bug.

Mysk proposes avoiding this security risk by using the Google Authenticator offline without associating it to a Google account or by not utilizing the syncing option. However, both options eliminate much of the new update’s utility.

In response to the security concerns, Brand claimed that optional end-to-end encryption is currently available in several Google products and that there are plans to offer it in the future for Google Authenticator. Mysk urges users to use the program without the new syncing function until then.

The sources for this piece include an article in TechRepublic.

Exit mobile version