Passkey Redaction Attacks Affect GitHub and Microsoft Authentication
Hackers can use adversary-in-the-middle (AitM) attacks to compromise Microsoft, GitHub, and other online accounts. These attacks impact passkey options on login pages, making users choose less secure authentication methods. Learn more about the threat and mitigation best practices.
- Poor implementation of passkeys has resulted in bypassing authentication flows despite increased use across the tech sector.
- AitM attacks can manipulate the view presented by modifying CSS, HTML, JavaScript, and images on the login page, removing references to passkey options.
Despite the recent transition by leading tech companies to use passkey-based authentication methods, researchers from managed detection and response service provider eSentire have found that such safeguards remain susceptible to sophisticated cyberattacks. Leading platforms of Microsoft and GitHub have become targets of the threat of passkey redaction attacks.
These attacks exploit vulnerabilities that arise from the poor implementation of passkey authentication mechanisms. Threat actors can manipulate authentication processes to circumvent or remove passkey options from login pages, pushing users to choose less secure login options and opening opportunities for adversary-in-the-middle (AitM) attacks.
See More: OpenAI Breach in 2023 Exposed Internal Messaging System
Malicious actors have successfully used this strategy to target GitHub and Microsoft, intercepting and altering authentication flow when the passkey technology has not been implemented with robust security measures. In both cases, users have been forced to choose conventional password-based authentication, resulting in illegitimate access to repositories and user accounts, exposing sensitive corporate and personal data.
Organizations using passkeys have recommended security measures such as regular system updates, enhanced security protocols, and user awareness training to minimize interception and manipulation. The threat highlights that while cybersecurity professionals are developing more advanced security technologies, attackers have switched to increasingly sophisticated attack methods.
While passkey technologies constitute a significant stride forward in authentication security, they are not immune to hackers’ efforts. Proper implementation, user awareness, and regular updates will remain essential to defend against redaction attacks and ensure the security of online platforms.