Which #authenticator app should I use on #iOS instead of #google..?!
Which #authenticator app should I use on #iOS instead of #google..?!
Microsoft has said that it's ending support for passwords in its Authenticator app starting August 1, 2025.
https://thehackernews.com/2025/07/microsoft-removes-password-management.html #Microsoft #Authenticator #Passcodes #Passkeys #Security #Tech
What is your favorite app for
Multifactor Authentication, and why do you like it most?
Not really surprised to see this.
Microsoft Authenticator is ending support for passwords.
https://www.theverge.com/news/695288/microsoft-authenticator-autofill-store-passwords
How long, you think, until Google and Microsoft make their authenticator products start charging users to get rid of the ads they will invariably place in to those products at some point?
Microsoft - the Walmart of passkeys...
Microsoft’s new “passwordless by default” is great but comes at a cost
Laser Cut Acrylic Provides Movie-Style Authentication - Here at Hackaday, we pride ourselves on bringing you the latest and greatest proje... - https://hackaday.com/2025/02/12/laser-cut-acrylic-provides-movie-style-authentication/ #securityhacks #authenticator #lasercut #acrylic #prop
@gunchleoc @mozilla I hate "#Authenticator #Apps" because there is no valid reason why they couldn't use #TOTP and/or #HOTP for that...
@kuketzblog +9001%
Insbesondere da viele #Authenticator - #Apps entwender nur #SingleVendor & #SingleProvider - #Müll, #Bloatware, #Govware oder gänzlich unsicher sind.
#AppZwang gehört verboten und ich hoffe @digitalcourage diesbezüglich mehr Druck macht, denn #Digitalzwang wird allzuoft als #Waffe gegen #Marginalisierte genutzt!
@GrapheneOS @thomas @wonka Also I think the issues usually outweigh the benefits - at least when we look at individuals & devices owned by consumers vs. corporate #ITsec where locking down devices is seen as desireable!
Because for every "#LegitimateInterest" (i.e. #2FA #Authenticator) I can find a dozen reasons this "functionaloty" should be discontinued and considered malware.
In *2019*, Alex Weinert of Microsoft wrote in https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/all-your-creds-are-belong-to-us/ba-p/855124:
«
MFA had failed.
[...]
All Authenticators Are Vulnerable
[...]
»
Today, as echoed in https://www.bleepingcomputer.com/news/microsoft/microsoft-enable-mfa-or-lose-access-to-admin-portals-in-october/, Microsoft still insists that using weak MFA is a good idea.
In https://azure.microsoft.com/en-us/blog/announcing-mandatory-multi-factor-authentication-for-azure-sign-in/ Microsoft writes (on August 15):
«
As recent research [1] by Microsoft shows that multifactor authentication (MFA) can block more than 99.2% of account compromise attacks, making it one of the most effective security measures available, today’s announcement brings us all one step closer toward a more secure future.
»
From that same article, "solutions" with (nearly as weak as SMS) "Microsoft Authenticator" is at the TOP of their list:
«
Organizations have multiple ways to enable their users to utilize MFA through Microsoft Entra:
• Microsoft Authenticator [...]
• FIDO2 security keys [...]
• Certificate-based authentication [...]
• Passkeys [...]
• Finally, and this is the least secure version of MFA, you can also use a SMS or voice approval [...]
»
From [1] (PDF) = https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RW166lD?culture=en-us , no date of the "investigation period" to be seen *anywhere*, and one of the authors being Alex Weinert, more extreme percentages (approved by Microsoft's marketing dept):
«
Our findings reveal that MFA implementation offers outstanding protection, with over 99.99% of MFA-enabled accounts remaining secure during the investigation period. Moreover, MFA reduces the risk of compromise by 99.22% across the entire population and by 98.56% in cases of leaked credentials.
»
Dear reader: please stop buying Microsoft BS that completely ignores PhaaS.
To name a few examples:
"Experts agree [*] that setting up two-factor authentication (2FA) İs one of the most powerful ways to protect your account from getting hacked. However, hackers like COLDRIVER and COLDWASTREL may try to trick you into entering your second factor; we have seen attackers successfully compromise a victim who had enabled 2FA." - (PDF) https://www.accessnow.org/wp-content/uploads/2024/08/Spearphishing-cases-in-Eastern-Europe-2022-2024-technical-brief.pdf
[*] Not me. My tip is here: https://infosec.exchange/@ErikvanStraten/112724966066248808
EvilGinx2: "Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication" - https://github.com/kgretzky/evilginx2 (there are more, like Modlishka, Muraena, CredSniper, EvilProxy (Phaas), NakedPages etc.)
Not even a fake website needed: https://www.bleepingcomputer.com/news/security/new-greatness-service-simplifies-microsoft-365-phishing-attacks/
From https://mrd0x.com/attacking-with-webview2-applications/:
«
Bypass 2FA
WebView2 also provides built-in functionality to extract cookies. This allows an attacker to extract cookies after the user authenticates into the legitimate website. This technique removes the need of having to spin up Evilginx2 or Modlishka but the obvious trade-off is that the user must execute the binary and authenticate.
»
In addition, from https://www.bleepingcomputer.com/news/security/clever-phishing-method-bypasses-mfa-using-microsoft-webview2-apps/:
«
"Yubikeys can't save you because you're authenticating to the REAL website not a phishing website."
mr.d0x
»
AND:
«
However, as mr.d0x admits and Microsoft pointed out in their response to our questions, this attack is a social engineering attack and requires a user to run a malicious executable.
»
Correct, but a local compromise does'nt protect you when you're using FIDO2 hardware keys or passkeys.
From 2022: https://microsoft.com/en-us/security/blog/2022/07/12/from-cookie-theft-to-bec-attackers-use-aitm-phishing-sites-as-entry-point-to-further-financial-fraud/:
«
A large-scale phishing campaign that used adversary-in-the-middle (AiTM) phishing sites stole passwords, hijacked a user’s sign-in session, and skipped the authentication process even if the user had enabled multifactor authentication (MFA).
»
"Phishing with Cloudflare Workers: Transparent Phishing and HTML Smuggling" - https://www.netskope.com/blog/phishing-with-cloudflare-workers-transparent-phishing-and-html-smuggling
"New EvilProxy Phishing Service Allowing Cybercriminals to Bypass 2-Factor Security" - https://thehackernews.com/2022/09/new-evilproxy-phishing-service-allowing.html
From https://www.europol.europa.eu/media-press/newsroom/news/international-investigation-disrupts-phishing-service-platform-labhost:
«
The investigation uncovered at least 40 000 phishing domains linked to LabHost, which had some 10 000 users worldwide.
[...]
LabRat was designed to capture two-factor authentication codes and credentials, allowing the criminals to bypass enhanced security measures.
»
"Security and Privacy Failures in Popular 2FA Apps" by Gilsenan et al. (USENIX 2023): https://www.usenix.org/conference/usenixsecurity23/presentation/gilsenan
The PDF can also be found here: https://github.com/blues-lab/totp-app-analysis-public (Aegis was one of the least problematic apps, and don't use Authy).
This is what is wrong with weak MFA/2FA:
You
o
/|\ [device + browser]
/ \ |
v
[login.microsoftonline-aitm.com]
|
v
[login.microsoftonline.com]
(no thanks to DV-certificates).
Please give me recommendations for #authenticator #apps for desktop #linux. One #resolution2024 is to #degoogle more.
My S-i-L fell for a #scam. Charges reversed, but her Apple ID was hacked in the process. I set up 2-step verification on all her accounts. I just learned that PayPal can ONLY be set up with an #Authenticator app now.
Apparently #PayPal won't let you use your phone number to verify anymore. AND they don't allow people to use printed backup codes!
My friends in info security get why PayPal did this, but trying to set up & walk her through the process took 5 hours over 3 days. UGH!
Microsoft verbessert Schutz im Authenticator vor MFA-Ermüdungsangriffen | heise online
https://heise.de/-9426209 #Microsoft #Authenticator
Two Factor Authentication Apps: Mistakes to Malware - Everyone in security will tell you need two-factor authentication (2FA), and we ag... - https://hackaday.com/2023/05/17/two-factor-authentication-apps-mistakes-to-malware/ #securityhacks #authenticator #featured #interest #password #oath #totp
The whole idea of sending your OTP seeds to a “cloud” ⃰ backup facility really challenges the fundamental principle of OTP.
⃰: “Cloud” -- noun; tech jargon. Someone else's computers doing something for you that you need done but don't want to handle yourself, beyond your control or visibility.
Attention Azure AD MFA admins: The mandatory rollout of "Number Matching" to all MFA users using Microsoft Authenticator app has been pushed out to May 8th, 2023.
https://learn.microsoft.com/en-us/azure/active-directory/authentication/how-to-mfa-number-match
#azuread #MFA #authenticator #numbermatching
@mysk The #Microsoft Authenticator sends telemetry to the mother ship. For Microsoft, the customer is the product.
#authenticator #telemetry
Has anyone enumerated the situations that get you a Microsoft Number Matching MFA prompt that OBSCURES the number but does NOT offer the "I can't see the number" option in the MS Authenticator app?
I am "the guy" that always breaks this shit, but I cannot recreate one edge case reliably so we can document it in our "weird shit that one user will see when numbering matching becomes required" document.
@micahflee
OK - I'm outing myself as someone who doesn't know much about tech stuff, but I really don't understand how an #authenticator app works or why it's better than using a phone number. I'd really appreciate it if someone could explain in not-too-techy language