Google Authenticator syncing feature exposes 2FA credentials

Share post:

According to security experts Tommy Mysk and Talal Haj Bakry, a new synchronization function in Google’s Authenticator 2FA software, which allows users to connect into numerous services, has a severe security issue. Mysk found the weakness, which is that “secrets” or credentials exchanged between devices are not end-to-end encrypted, allowing attackers or Google to read the credentials.

Christiaan Brand, Google Group Product Manager, Identity and Security, defended the software, claiming that it shipped as planned. However, because there is no end-to-end encryption, Google can see what services each account owner uses, potentially allowing the company to target personalized ads. Users are also vulnerable to attackers as a result of the bug.

Mysk proposes avoiding this security risk by using the Google Authenticator offline without associating it to a Google account or by not utilizing the syncing option. However, both options eliminate much of the new update’s utility.

In response to the security concerns, Brand claimed that optional end-to-end encryption is currently available in several Google products and that there are plans to offer it in the future for Google Authenticator. Mysk urges users to use the program without the new syncing function until then.

The sources for this piece include an article in TechRepublic.

SUBSCRIBE NOW

Related articles

Cyber Security Today, Week in Review for week ending Friday May 17, 2024

Welcome to Cyber Security Today. This is the Week in Review for the week ending Friday, May 17th,...

Cyber Security Today, May 17, 2024 – Malware hiding in Apache Tomcat servers

Malware hiding in Apache Tomcat servers, new backdoors found, and more Welcome to Cyber Security Today. It's Friday, May...

MIT students exploit blockchain vulnerability to steal 25 million dollars

Two MIT students have been implicated in a highly sophisticated cryptocurrency heist, where they reportedly exploited a vulnerability...

Cyber Security Today, May 15, 2024 – Ebury botnet still exploits Linux servers, Microsoft, SAP and Apple issue security updates

The Ebury botnet continues to exploit Linux servers, Microsoft, SAP and Apple issue security updates, and more. Welcome to...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways