EUCLEAK attack
EUCLEAK attack
Posted Sep 4, 2024 16:25 UTC (Wed) by hmh (subscriber, #3838)In reply to: FIDO2 HW token on office.com by Wol
Parent article: Firefox 130.0 released
The attack is *not* "easy" in the normal way you'd use that word, and the security researchers make it quite clear that you are much better off keeping your vulnerable device in use, than trying to do without any security token at all. But you should still replace it with a fixed one in due time. And ensure any new ones you get are not vulnerable [to that attack], of course.
Do read, or at least skim, their paper if you have the time. It is worth it.
BTW, it is not just Yubikeys and other hardware tokens like it: the attack works on many crypto-currency hardware wallets, and also e-passports from several countries, for example. For at least the wallets, well, you really should find a non-vulnerable one sooner than later if the amount of crypto-currency involved is non-trivial IMO.
Better links:
https://ninjalab.io/eucleak/
https://news.ycombinator.com/item?id=41434500
Posted Sep 4, 2024 21:56 UTC (Wed)
by geuder (subscriber, #62854)
[Link] (3 responses)
I agree. Really understanding the 80+ pages is probably impossible for 99.9% of the readers including myself. But I found it rather accessible to read anyway.
They also say clearly in the beginning: It's safer to use an affected Yubikey than not to use it because of their discovery.
Unless you are Julian Assange, Edward Snowden, or someone with similarly powerful adversary there is nothing to be worried about even after this attack.
Posted Sep 5, 2024 10:01 UTC (Thu)
by farnz (subscriber, #17727)
[Link] (2 responses)
Specifically, for the EUCLEAK attack to be of concern to you, the attacker needs to be able to do the following without getting caught:
Steps 1, 3 and 5 are all hard to do without leaving traces, unless you've got powerful backers, and for most of us, the work involved in doing those steps is not worth the gain (access to accounts protected by Yubikey + password).
Posted Sep 5, 2024 11:49 UTC (Thu)
by excors (subscriber, #95769)
[Link] (1 responses)
Posted Sep 5, 2024 13:14 UTC (Thu)
by farnz (subscriber, #17727)
[Link]
Indeed - and one of the consequences of that is that the attack is only relevant where the attacker has the capability to do a complex process taking about an hour and with risk of getting caught in order to clone your Yubikey, but does not have the capability to take your Yubikey and keep you from noticing that they've done so (e.g. because they've got you in a jail cell) until they've finished extracting everything of value from your accounts.
Doesn't stop it being a cool piece of research, and something we should aim to defend ourselves against in the long run; does mean that it's of limited practical relevance.
EUCLEAK attack
EUCLEAK attack
EUCLEAK attack
EUCLEAK attack