Some firms often recommend Two-factor authentication (2FA) as an extra layer of security. It’s supposedly perfect as one a part of the puzzle is always with the user, making it tough for anyone remotely to enter a system.
While there are ways to bypass 2FA, it is somewhat tough. A hacking organization reportedly backed by the Chinese government has efficiently managed to breach 2FA in a sophisticated way.
Based on a report by Dutch cyber-security agency Fox-IT, hackers from APT20 targetted government and private individuals in over ten international locations including Brazil, France, China, Italy, Germany, Mexico, Portugal, Spain, the U.K., and the U.S. Aviation, healthcare, finance, insurance, and energy firms have been the primary targets of the hack, which came to light when one of many affected firms contacted Fox-it.
The RSA SecurID authentication algorithm consists of a hardware or software “token”. APT20 successfully managed to compromise one such RSA SecurID software program token and then used it to generate legit software keys at will. These tokens are virtually ineffective without accompanying hardware; however, the hackers discovered a way around that too.
Because of this, APT20 might now freely log in to company VPNs, additional establishing their presence in a network.
While the prospect of 2FA being breached is a terrifying one, there is no purpose of ceasing using it. It’s arguably one of the robust types of security available today and can continue to be until companies determine how to add a 3rd authenticating factor.