This Tool Can Hack Your Accounts Even with Two-Factor Authentication

This Tool Can Hack Your Accounts Even with Two-Factor Authentication

The internet is a dangerous place, replete with shady people looking to steal your personal information. Enabling two-factor authentication (sometimes called two-factor verification) is one of the best way to keep your online accounts secure. However, famed hacker Kevin Mitnick shows how even this security measure can’t completely protect your data if you don’t remain constantly vigilant.

The hack in question was not developed by Mitnick, who works as Chief Hacking Officer for security firm KnowBe4. Credit for that goes to Mitnick’s friend and white hat hacker Kuba Gretzky. The tool is known as evilginx, and it makes phishing feasible even when the target uses two-factor authentication. It’s essentially a man-in-the-middle attack, but it uses proxy_pass and sub_filter to modify and capture HTTP traffic. It requires a Nginx HTTP server and some familiarity with Debian Linux. Many people have the necessary expertise to do it.

You can get a complete technical rundown of evilginx on Gretzky’s site, but Mitnick has a nice, digestible video demo of the tool in action(embedded below). He uses LinkedIn as an example, but it could be used on Google, Facebook, and anything else that uses standard two-factor login. The attack starts in the same way all phishing attacks do — with a cleverly crafted email. You have to convince the target to click on a link that loads your site, which masquerades as the page your target expects. In this case, it’s LinkedIn.

Stealing a username and password like this is simple because they don’t change. A two-factor code changes every few seconds, so taking that from your fake page is pointless. Using evilginx, Mitnick shows how the page captures not the 2FA code but the session cookie. That identifies the user to a site, allowing the attacker to hop onto your account immediately.

Mitnick goes on to show how you can load the session cookie manually via the Chrome developer console, which only takes a few clicks. Then, all you need to do is reload the page, and LinkedIn displays the logged-in session. You don’t need to enter a username, password, or even the 2FA code.

Gretzky has published the code for his 2FA hack on GitHub, so everyone has access to it. That means people could try to use it for phishing purposes, but security researchers and educators can also help protect users. It just goes to show you; even two-factor authentication won’t protect you from your own poor decisions.

Continue reading

Review: The Oculus Quest 2 Could Be the Tipping Point for VR Mass Adoption
Review: The Oculus Quest 2 Could Be the Tipping Point for VR Mass Adoption

The Oculus Quest 2 is now available, and it's an improvement over the original in every way that matters. And yet, it's $100 less expensive than the last release. Having spent some time with the Quest 2, I believe we might look back on it as the headset that finally made VR accessible to mainstream consumers.

AMD Buys FPGA developer Xilinx in $35 Billion Deal
AMD Buys FPGA developer Xilinx in $35 Billion Deal

The deal, which we discussed earlier this month, will give AMD access to new markets that it hasn't previously played in, including FPGAs and artificial intelligence.

AMD Smashes Revenue Records as Zen 3, Xbox Series X, PS5 Ramp Up
AMD Smashes Revenue Records as Zen 3, Xbox Series X, PS5 Ramp Up

AMD's Q3 2020 results are in, and the results are excellent for the company, in every particular.

Samsung, Stanford Built a 10,000 PPI Display That Could Revolutionize VR, AR
Samsung, Stanford Built a 10,000 PPI Display That Could Revolutionize VR, AR

Ask anyone who has spent more than a few minutes inside a VR headset, and they'll mention the screen door effect. This could eliminate it for good.