Passkey Redaction Attacks Affect GitHub and Microsoft Authentication

Hackers can use adversary-in-the-middle (AitM) attacks to compromise Microsoft, GitHub, and other online accounts. These attacks impact passkey options on login pages, making users choose less secure authentication methods. Learn more about the threat and mitigation best practices.

July 9, 2024

Passkey Security
(Credits: Shutterstock.com)

  • Poor implementation of passkeys has resulted in bypassing authentication flows despite increased use across the tech sector.
  • AitM attacks can manipulate the view presented by modifying CSS, HTML, JavaScript, and images on the login page, removing references to passkey options.

Despite the recent transition by leading tech companies to use passkey-based authentication methods, researchers from managed detection and response service provider eSentire have found that such safeguards remain susceptible to sophisticated cyberattacks. Leading platforms of Microsoft and GitHub have become targets of the threat of passkey redaction attacks.

These attacks exploit vulnerabilities that arise from the poor implementation of passkey authentication mechanisms. Threat actors can manipulate authentication processes to circumvent or remove passkey options from login pages, pushing users to choose less secure login options and opening opportunities for adversary-in-the-middle (AitM) attacks.

See More: OpenAI Breach in 2023 Exposed Internal Messaging System

Malicious actors have successfully used this strategy to target GitHub and Microsoft, intercepting and altering authentication flow when the passkey technology has not been implemented with robust security measures. In both cases, users have been forced to choose conventional password-based authentication, resulting in illegitimate access to repositories and user accounts, exposing sensitive corporate and personal data.

Organizations using passkeys have recommended security measures such as regular system updates, enhanced security protocols, and user awareness training to minimize interception and manipulation. The threat highlights that while cybersecurity professionals are developing more advanced security technologies, attackers have switched to increasingly sophisticated attack methods.

While passkey technologies constitute a significant stride forward in authentication security, they are not immune to hackers’ efforts. Proper implementation, user awareness, and regular updates will remain essential to defend against redaction attacks and ensure the security of online platforms.

LATEST NEWS STORIES

Anuj Mudaliar
Anuj Mudaliar is a content development professional with a keen interest in emerging technologies, particularly advances in AI. As a tech editor for Spiceworks, Anuj covers many topics, including cloud, cybersecurity, emerging tech innovation, AI, and hardware. When not at work, he spends his time outdoors - trekking, camping, and stargazing. He is also interested in cooking and experiencing cuisine from around the world.
Take me to Community
Do you still have questions? Head over to the Spiceworks Community to find answers.