Jump to content

Android malware "Cerberus" might be able to grab your Google Authenticator 2FA codes.

According to ZDNet there is a malware currently in development that can grab screenshots from your Google Authenticator to get access to its 2FA codes.

 

Article: https://www.zdnet.com/article/google-could-have-fixed-2fa-code-stealing-flaw-in-authenticator-app-years-ago/

 

"This malware called Cerberus has this feature currently under development" - Researchers from "ThreadFabric" discovered. But it might not be long until it is out in the wild. The core feature that allows this attack (except from being infected with the malware in the first place - DOH) is the capability to take screenshots of Google Authenticator - a feature that Android itself has a flag for to prevent this from happening. Google just never applied this flag to the Google Authenticator (facepalm). The best part is, that Google was informed about this bug back in 2014 and didn*t fix it yet (double facepalm).

 

See here: https://wwws.nightwatchcybersecurity.com/2020/03/03/google-authenticator-for-android-allows-screen-capture/

 

I hope Google fixes this bug now that the impacts are getting closer. It does not protect you from all harm that can be done by hackers when they successfully installed malware on your Android device, but it will make it harder for them and maybe mitigate some of the damages they can do.

 

EDIT: More on that topic from ZDNet: https://www.zdnet.com/article/using-google-authenticator-heres-why-you-should-get-rid-of-it/

Edited by Questargon
Additional ZDNet article

CPU Ryzen 7 5800X | MoBo MSI B550 Gaming Plus | RAM 32GB Teamgroup @3600/18 | GPU EVGA RTX 3070 Ti FTW | Case Enthoo Pro M SE
PSU bq! Straight Power 11 Plat. 750W CM | Cooling Scythe Fuma 2 & 5x Corsair ML140 | Sound SB Z Retail | Storage Samsung 970 EVO 500GB
Display(s) Iiyama GB3461WQSU, Dell 24", LG 34UM95 | Keyboard Kinesis Freestyle Edge | Mouse Logitech G900 Chaos Spectrum | OS Windows 11

Link to comment
Share on other sites

Link to post
Share on other sites

Damn. Now they'll get all my passwords to the nukes I have in the basement.

 

Seriously, though, you shouldn't have an issue unless you are just clicking on random stuff online. Most of these hacks require an entry point created by the user themselves. Hackers don't do brute force unless they really want something and that can be rare. I only use brute force if I'm testing something on my own systems. It's a pain in the ass.

 

 

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

I don't remember the google account I installed the authenticor on, so I can't get back to it,  suffice to say the codes it generated 5 years ago are still valid today anyway.  I have had serious doubts as to the security of authenticator since then anyway and don;t use it for anything else as a result.

Grammar and spelling is not indicative of intelligence/knowledge.  Not having the same opinion does not always mean lack of understanding.  

Link to comment
Share on other sites

Link to post
Share on other sites

This is they 2factor applications (even if they are on your phone) should be using crypto to encrypt the secretes in such a way that the phones security chip is the only chip that can decrypt them. It should then only request them to be decrypted (into memory) when needed to compute a 2factor code. 1Password does a good job of this.

Link to comment
Share on other sites

Link to post
Share on other sites

1 hour ago, Twilight said:

I use Authy... so I guess I'm safe?

Probably for now. Though same rules apply, it's just that most ppl use Google Authenticator and things can be automated easier if you have same app to exploit or capture images of. Opposed to expecting some other slightly less popular like Authy to be present.

Link to comment
Share on other sites

Link to post
Share on other sites

15 minutes ago, RejZoR said:

Probably for now. Though same rules apply, it's just that most ppl use Google Authenticator and things can be automated easier if you have same app to exploit or capture images of. Opposed to expecting some other slightly less popular like Authy to be present.

you can protect authy with a pin, so apps can't just take screenshots of it. they can when you have it unlocked though... 

She/Her

Link to comment
Share on other sites

Link to post
Share on other sites

Yeah, I have used Authy for a while now. Prefer it over Google's offering anyway.

Please quote my post, or put @paddy-stone if you want me to respond to you.

Spoiler
  • PCs:- 
  • Main PC build  https://uk.pcpartpicker.com/list/2K6Q7X
  • ASUS x53e  - i7 2670QM / Sony BD writer x8 / Win 10, Elemetary OS, Ubuntu/ Samsung 830 SSD
  • Lenovo G50 - 8Gb RAM - Samsung 860 Evo 250GB SSD - DVD writer
  •  
  • Displays:-
  • Philips 55 OLED 754 model
  • Panasonic 55" 4k TV
  • LG 29" Ultrawide
  • Philips 24" 1080p monitor as backup
  •  
  • Storage/NAS/Servers:-
  • ESXI/test build  https://uk.pcpartpicker.com/list/4wyR9G
  • Main Server https://uk.pcpartpicker.com/list/3Qftyk
  • Backup server - HP Proliant Gen 8 4 bay NAS running FreeNAS ZFS striped 3x3TiB WD reds
  • HP ProLiant G6 Server SE316M1 Twin Hex Core Intel Xeon E5645 2.40GHz 48GB RAM
  •  
  • Gaming/Tablets etc:-
  • Xbox One S 500GB + 2TB HDD
  • PS4
  • Nvidia Shield TV
  • Xiaomi/Pocafone F2 pro 8GB/256GB
  • Xiaomi Redmi Note 4

 

  • Unused Hardware currently :-
  • 4670K MSI mobo 16GB ram
  • i7 6700K  b250 mobo
  • Zotac GTX 1060 6GB Amp! edition
  • Zotac GTX 1050 mini

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

6 hours ago, Twilight said:

I use Authy... so I guess I'm safe?

I made the switch to Authy a couple of months ago. I'm hoping we're safe for now.

The deep blue sky is infinitely high and crystal clear.

私はオタクではありません。

Link to comment
Share on other sites

Link to post
Share on other sites

10 minutes ago, Xiee said:

I made the switch to Authy a couple of months ago. I'm hoping we're safe for now.

well, my most important accounts are protected by SMS, so even if authy isn't safe either i can grab my old nokia 3310, put my sim in that and use that for 2-factor lmao

She/Her

Link to comment
Share on other sites

Link to post
Share on other sites

5 hours ago, Twilight said:

you can protect authy with a pin, so apps can't just take screenshots of it. they can when you have it unlocked though... 

The problem is when it gets unlocked...

Link to comment
Share on other sites

Link to post
Share on other sites

2 minutes ago, RejZoR said:

The problem is when it gets unlocked...

í said that literally in the post you quoted...

She/Her

Link to comment
Share on other sites

Link to post
Share on other sites

How do they fail so much.. 

| Ryzen 7 7800X3D | AM5 B650 Aorus Elite AX | G.Skill Trident Z5 Neo RGB DDR5 32GB 6000MHz C30 | Sapphire PULSE Radeon RX 7900 XTX | Samsung 990 PRO 1TB with heatsink | Arctic Liquid Freezer II 360 | Seasonic Focus GX-850 | Lian Li Lanccool III | Mousepad: Skypad 3.0 XL / Zowie GTF-X | Mouse: Zowie S1-C | Keyboard: Ducky One 3 TKL (Cherry MX-Speed-Silver)Beyerdynamic MMX 300 (2nd Gen) | Acer XV272U | OS: Windows 11 |

Link to comment
Share on other sites

Link to post
Share on other sites

My tool of choice is "andOTP" for Android now.

CPU Ryzen 7 5800X | MoBo MSI B550 Gaming Plus | RAM 32GB Teamgroup @3600/18 | GPU EVGA RTX 3070 Ti FTW | Case Enthoo Pro M SE
PSU bq! Straight Power 11 Plat. 750W CM | Cooling Scythe Fuma 2 & 5x Corsair ML140 | Sound SB Z Retail | Storage Samsung 970 EVO 500GB
Display(s) Iiyama GB3461WQSU, Dell 24", LG 34UM95 | Keyboard Kinesis Freestyle Edge | Mouse Logitech G900 Chaos Spectrum | OS Windows 11

Link to comment
Share on other sites

Link to post
Share on other sites

9 hours ago, Twilight said:

well, my most important accounts are protected by SMS, so even if authy isn't safe either i can grab my old nokia 3310, put my sim in that and use that for 2-factor lmao

SMS 2FA also has a bunch of flaws, most notably SIM Swap. SIM swapping is far less of a problem for regular end users (that is, people who aren't being specifically targeted) because it requires the attacker to obtain the victim's phone number and socially engineer their network provider to provide a SIM card, but it is basically impossible for the victim to protect against it.

 

In this case, it does look like the malware is designed for more mass credential harvesting, so in that case I think it is fair to say that for the average person they would be marginally more secure with SMS 2FA. It mustn't be used to protect particularly valuable information or by anyone notable though, because it will get breached.

 

Basically, proper security is hard.

HTTP/2 203

Link to comment
Share on other sites

Link to post
Share on other sites

5 hours ago, colonel_mortis said:

SMS 2FA also has a bunch of flaws, most notably SIM Swap. SIM swapping is far less of a problem for regular end users (that is, people who aren't being specifically targeted) because it requires the attacker to obtain the victim's phone number and socially engineer their network provider to provide a SIM card, but it is basically impossible for the victim to protect against it.

the providers here have more security to protect against that than elsewhere. it's not perfect, but it's a hell of a lot better usually. sometimes they send a code to your phone number to verify that it's really you trying to swap the number etc. again it's not perfect but it's better. as well as that I have the security notifications enabled on all my devices for all of those accounts, so if someone does get access to them I can immediately yeet them. 

She/Her

Link to comment
Share on other sites

Link to post
Share on other sites

1 hour ago, Twilight said:

the providers here have more security to protect against that than elsewhere. it's not perfect, but it's a hell of a lot better usually. sometimes they send a code to your phone number to verify that it's really you trying to swap the number etc. again it's not perfect but it's better. as well as that I have the security notifications enabled on all my devices for all of those accounts, so if someone does get access to them I can immediately yeet them. 

Your location and providers you use don't necessarily offer better protection that anybody else. I'm in Arizona with AT&T and Mint Mobile. While both offer very good protection, AT&T even offers their own cybersecurity suite, they are just as fallible as others due to the human factor. SIM swapping/jacking is still a thing which is why I don't use my phone number for 2FA.

 

 

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

2 minutes ago, FakeCIA said:

Your location and providers you use don't necessarily offer better protection that anybody else. I'm in Arizona with AT&T and Mint Mobile. While both offer very good protection, AT&T even offers their own cybersecurity suite, they are just as fallible as others due to the human factor. SIM swapping/jacking is still a thing which is why I don't use my phone number for 2FA.

I mean, the thing is that I've never heard of it happening here, even to important targets like celebrities.

She/Her

Link to comment
Share on other sites

Link to post
Share on other sites

1 hour ago, Twilight said:

I mean, the thing is that I've never heard of it happening here, even to important targets like celebrities.

The general media don't always report things like that because they deem it unimportant or something that won't make money, unless it's Ryan Reynold's phone number. The best sources to learn about how common these scams or breaches are, in the USA, are the Federal Bureau of Investigation, the Secret Service, and the Department of Homeland Security. Scams like SIM jacking happen to hundreds of people every hour.

 

https://www.fbi.gov/investigate/cyber

https://www.secretservice.gov/investigation/#cyber

https://www.dhs.gov/topic/cybersecurity

Edited by FakeCIA
Added Official Websites

 

 

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

On 3/10/2020 at 5:08 AM, hishnash said:

This is they 2factor applications (even if they are on your phone) should be using crypto to encrypt the secretes in such a way that the phones security chip is the only chip that can decrypt them. It should then only request them to be decrypted (into memory) when needed to compute a 2factor code. 1Password does a good job of this.

I agree that there should be a better encryption method than the basic 2FA that we use anyways. This could amount to something more complex than the braindead-easy, but efficient 2FA process, which would upset a lot of the users at present.

1 hour ago, Twilight said:

the providers here have more security to protect against that than elsewhere. it's not perfect, but it's a hell of a lot better usually. sometimes they send a code to your phone number to verify that it's really you trying to swap the number etc. again it's not perfect but it's better. as well as that I have the security notifications enabled on all my devices for all of those accounts, so if someone does get access to them I can immediately yeet them. 

This point bears repeating. Whatever the encryption process, the final say should be with the user, and not anybody else!
~Engineer.AI

Engineer.AI

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×