Social Icons

Wednesday, March 4, 2020

This banking Trojan can steal everything from your data, even your strong authentication codes
Cerberus malware has a feature that extracts single-use codes and sends them to an external server. Proof that the smartphone is not the best place for strong authentication.

Strong authentication by SMS, as we know, is no longer highly recommended, because hackers have the means to intercept them. This is why banks are gradually abandoning this type of technology in favor of single-use codes generated by mobile applications. But that solution is not necessarily ideal either, as a report by ThreatFabric shows.
The company recently got their hands on a new version of the Cerberus Trojan, capable of stealing code generated by Google Authenticator, one of the most popular applications in the area of ​​strong authentication.
By abusing accessibility privileges on Android, this malware can extract codes from the application’s graphical interface and send them to an external server.

Launching the Google Authenticator app is not a big deal, as Cerberus integrates TeamViewer, the famous remote control software used by IT maintenance departments. This allows you to install and launch any application on the phone. Beforehand, it will obviously be necessary to recover the unlock code of the device. That's good, Cerberus has a function that generates an "overlay" on the unlock screen, that is to say a graphical interface that overlaps without this being seen. When the user enters his code, he is intercepted by the hacker.

Google Authenticator is not used by any French bank to our knowledge. Establishments prefer to integrate the generation of single-use codes - or simple validation with an OK button - directly into their mobile applications. But nothing prevents us from imagining a Cerberus variant tailor-made for these dedicated applications.

This fairly sophisticated malware shows that the smartphone is not necessarily the best choice for generating a second authentication factor. If the device is infected with a Trojan horse, strong authentication security is worthless. This is why it would be better to use security keys, such as those offered by Yubico or Google, with the Titan. This material is impossible to hack and therefore offers much better security. Banks still need to integrate them into their access technologies.

Source: ThreatFabric


Younes Derfoufi
my-courses.net

No comments:

Post a Comment

Category Of Mobile Courses

Actualités (644) Adsense (1) Affiliation (1) Algebraic Topology (1) Algorithmic (1) all-news (30) Android (5) Android App (8) Android app without code (4) Android Apps (169) Android Development (4) Android download (2) Android OS (3) AngularJS (1) Automata theory and formal language (5) C programming (5) Category and Functor (8) CMS (3) Computer Glossary (18) Create Mobile App With Ionic Framework (2) CSS (2) CSS-Cascading-Style-Sheets (4) Developpement Java (13) Differential Geometry (1) Django-Python-Framework (8) dropshiping (26) Earn Money by Internet (4) Emplois (23) Framework php (2) Fraud (2) HTML (7) Java For Beginners (10) Javascript (12) Kotlin Programming Language (8) Kotlin For Mobile Android (1) Linux Download (2) Marketing (5) Mobile (3) Mobile Courses (4) Mobile Marketing (4) MoneyGram (1) News (721) Node.js (5) Open Source (1) Photoshop (1) Protect Computer (1) Python (33) Python BeautifulSoup (1) Python For Data Science (2) Python-Books (6) Python-DVD-Training (1) Python-Exercises (138) Python-Framework (1) Python-IDE (1) Python-Modules (1) Python-pdf (2) Python-pyQt (1) Référencement (2) Script PHP (2) Security (6) SEO (1) Snipping Tool: Faq (1) Social Networks (1) Source Code (1) Statistics With SPSS (2) Surveillance Software (1) Travail à domicile (6) Tutoriels php en vidéos (2) Tutoriels-MySql (6) tutoriels-php (19) Utilitaires (1) VPS (1) Web Hosting (1) Webcam (1) Webmarketing (11) Western Union (1) Windows 10 (1) Windows 7 (4) Windows 7 Faq (2) Windows 8 (1) Windows Accessories (1) Windows Download (8) Windows Drivers (1) Windows Fonts (1) Windows Power Shell (2) Windows Registry (2) Windows Security (18) Windows Software (2) Windows Spyware (2) Windows utilities (3) Windows Virus (2) Windows Vista (3) Windows Wireless (1) Windows xp (1) Wordpress (1)
 

Sample text

Sample Text

 
Blogger Templates