Categories: HackingSecurity

Google improved 2-Step Verification with Security Key

Google has announced the introduction of an improved two-factor authentication mechanism based on a USB token dubbed Security Key.

Google firm considers cyber security a pillar of its business, the last initiative announced by the company is the introduction of an improved two-factor authentication system for its services, including Gmail. The new 2FA process is based on the use of a tiny hardware token that will allow the authentication only when users visit legitimate Google sites.

The new hardware is named Security Key system and will be introduced by the company to prevent attacks based on cloned websites that are designed to steal users’ credentials. This kind of attacks is becoming even more sophisticated, recently security experts at Symantec discovered a phishing campaign, which exploits SSL connections used by DropBox, and in the last months a similar technique was used to host malicious content on Google Drive storage service.

Phishing is a very common and dangerous practice in the criminal ecosystem as reported in the last APWG report, new techniques exploit paradigms like mobile, cloud computing and social networking.

As explained in the official page of the Security Key system, the hardware used by Google is a small USB token that implements the FIDO Alliance’s Universal 2nd Factor specification.

Security Key is a physical USB second factor that only works after verifying the login site is truly a Google website, not a fake site pretending to be Google. Rather than typing a code, just insert Security Key into your computer’s USB port and tap it when prompted in Chrome. When you sign into your Google Account using Chrome and Security Key, you can be sure that the cryptographic signature cannot be phished,” Nishit Shah, security product manager at Google, said in a blog post.

The Security Key represents an excellent solution for those customers that need a strong security for their accounts, typically all those people that manage sensitive data, but anyway I strongly suggest it’s adoption on a large scale. Users can acquire it from popular retailers and also from Amazon.

“If you use 2-Step Verification, you can choose Security Key as your primary method, instead of having verification codes sent to your phone. With Security Key, there’s no looking at codes and re-typing―you simply insert your Security Key into your computer’s USB port when asked.” states Google.

The basic two-factor authentication system implemented by Gmail uses the mobile device as an authentication token. This authentication process, despite protects users against account takeovers by requiring physical access to the mobile phone doesn’t protect Google users against other type of attacks like phishing.

“With 2-Step Verification, Google requires something you know (your password) and something you have (like your phone) to sign in. Google sends a verification code to your phone when you try to sign in to confirm it’s you. However, sophisticated attackers could set up lookalike sites that ask you to provide your verification codes to them, instead of Google. Security Key offers better protection against this kind of attack, because it uses cryptography instead of verification codes and automatically works only with the website it’s supposed to work with,” Google’s description of the new system says.

Th Security Key system initially will work only in Chrome, but according to Google it will be soon available for other browsers and with all the websites implementing the U2F protocol.

As explained by Google there are the following cases where users will want to use verification codes instead of a Security Key:

  • You use your account only on a mobile device. Security Key requires a USB port to work, so it’s not recommended for mobile-only users.
  • You don’t use Chrome. Security Key does not work on browsers other than Chrome.

Pierluigi Paganini

(Security Affairs – Security Key, Google)

 

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Senegal shuts National ID office after ransomware attack

Senegal closed its national ID card office after a ransomware cyberattack disrupted ID, passport, and…

2 hours ago

Dutch agencies hit by Ivanti EPMM exploit exposing employee contact data

Dutch agencies confirmed attacks exploiting Ivanti EPMM flaws that exposed employee contact data at the…

3 hours ago

China-linked APT UNC3886 targets Singapore telcos

China-linked group UNC3886 targeted Singapore ’s telecom sector in a cyber espionage campaign, Singapore’s Cyber…

5 hours ago

Critical Fortinet FortiClientEMS flaw allows remote code execution

Fortinet warns of a critical FortiClientEMS vulnerability that lets remote attackers run malicious code without…

16 hours ago

BeyondTrust fixes critical pre-auth bug allowing remote code execution

BeyondTrust patched a critical pre-auth flaw in Remote Support and PRA that could let attackers…

17 hours ago

European Commission probes cyberattack on mobile device management system

The European Commission is investigating a cyberattack after detecting signs that its mobile device management…

23 hours ago

This website uses cookies.