<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: [Off topic] Google Authenticator article in Peer-Peer Topics</title>
    <link>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Off-topic-Google-Authenticator-article/m-p/1016#M699</link>
    <description>&lt;P&gt;I don't think Google had any blame.&amp;nbsp; When they said how it happened (below) it's pretty obvious.&lt;/P&gt;&lt;P&gt;"The attack used a URL impersonating Retool's internal identity portal and was launched during a previously announced migration of logins to Okta.&lt;/P&gt;&lt;P&gt;While most of the targeted employees ignored the phishing text message, one clicked the embedded phishing link that redirected to a fake login portal with a multi-factor authentication (MFA) form.&lt;/P&gt;&lt;P&gt;After signing in, the attacker deepfaked an employee's voice and called the targeted IT team member, tricking them into providing an additional MFA code, which allowed the addition of an attacker-controlled device to the targeted employee's Okta account."&lt;/P&gt;</description>
    <pubDate>Mon, 18 Sep 2023 19:05:44 GMT</pubDate>
    <dc:creator>panderson</dc:creator>
    <dc:date>2023-09-18T19:05:44Z</dc:date>
    <item>
      <title>[Off topic] Google Authenticator article</title>
      <link>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Off-topic-Google-Authenticator-article/m-p/1004#M693</link>
      <description>&lt;P&gt;Interesting read about how a company believes Google Authenticator Sync was to blame for customer breach, at least in part during their transition to a new SSO platform&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.bleepingcomputer.com/news/security/retool-blames-breach-on-google-authenticator-mfa-cloud-sync-feature/" target="_blank"&gt;https://www.bleepingcomputer.com/news/security/retool-blames-breach-on-google-authenticator-mfa-cloud-sync-feature/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 16 Sep 2023 12:36:33 GMT</pubDate>
      <guid>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Off-topic-Google-Authenticator-article/m-p/1004#M693</guid>
      <dc:creator>alexgrutza</dc:creator>
      <dc:date>2023-09-16T12:36:33Z</dc:date>
    </item>
    <item>
      <title>Re: [Off topic] Google Authenticator article</title>
      <link>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Off-topic-Google-Authenticator-article/m-p/1006#M694</link>
      <description>&lt;P&gt;Well, if you let yourself be fished... then you have already lost the game.&lt;/P&gt;&lt;P&gt;Useless to point fingers after they failed the first rule of &lt;EM&gt;never giving out your credentials to third-parties&lt;/EM&gt;.&lt;/P&gt;&lt;P&gt;"Third-parties" includes anything that isn't yourself, or the actual service the credentials are for.&lt;/P&gt;&lt;P&gt;If you input them into a third-party app or service, then you are the only one to blame.&lt;/P&gt;</description>
      <pubDate>Sun, 17 Sep 2023 03:01:24 GMT</pubDate>
      <guid>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Off-topic-Google-Authenticator-article/m-p/1006#M694</guid>
      <dc:creator>Kim_Nilsson</dc:creator>
      <dc:date>2023-09-17T03:01:24Z</dc:date>
    </item>
    <item>
      <title>Re: [Off topic] Google Authenticator article</title>
      <link>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Off-topic-Google-Authenticator-article/m-p/1011#M695</link>
      <description>&lt;P&gt;Unfortunately not all of our users can be trusted not to click phishing links, or even helpdesk folks not to be tricked (&lt;A href="https://arstechnica.com/security/2023/09/a-phone-call-to-helpdesk-was-likely-all-it-took-to-hack-mgm/" target="_blank" rel="noopener"&gt;arstechnica..../a-phone-call-to-helpdesk-was-likely-all-it-took-to-hack-mgm/&lt;/A&gt;).&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think they have a valid point (definitely speculation at this point as to the true cause), that if an attacker gets access to someone who has the Google Auth Sync set up, that they may also have full access to all of that persons Google Auth codes for other systems.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Sep 2023 12:54:37 GMT</pubDate>
      <guid>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Off-topic-Google-Authenticator-article/m-p/1011#M695</guid>
      <dc:creator>alexgrutza</dc:creator>
      <dc:date>2023-09-18T12:54:37Z</dc:date>
    </item>
    <item>
      <title>Re: [Off topic] Google Authenticator article</title>
      <link>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Off-topic-Google-Authenticator-article/m-p/1012#M696</link>
      <description>&lt;P&gt;Something true to be said about back in the day learning that a good security practice is to not have your direct route all provided by the same vendor (or even version of firmware/software)&lt;/P&gt;&lt;P&gt;Example: Cisco ASA XYA firewall, Cisco Switches, Cisco USC appliance, Cisco VoIP appliance...&lt;/P&gt;&lt;P&gt;More likely to be an easier target if a compromised function on the Firewall happens to also work on every other device all the way to the end-data...&lt;/P&gt;&lt;P&gt;Having your Google account (Gmail, Drive, etc.) also be the password/TOTP/etc. "vault" which is synced? Similar shortcoming in security it would seem from my perspective. Your Google account compromised now possibly opens up your entire Google portfolio to the attacker.&lt;/P&gt;&lt;P&gt;&lt;a href="https://www.googleforeducommunity.com/t5/user/viewprofilepage/user-id/29"&gt;@Kim_Nilsson&lt;/a&gt;&amp;nbsp;"that's why they should use passkeys" - I can here it now lol&lt;/P&gt;</description>
      <pubDate>Mon, 18 Sep 2023 13:00:49 GMT</pubDate>
      <guid>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Off-topic-Google-Authenticator-article/m-p/1012#M696</guid>
      <dc:creator>alexgrutza</dc:creator>
      <dc:date>2023-09-18T13:00:49Z</dc:date>
    </item>
    <item>
      <title>Re: [Off topic] Google Authenticator article</title>
      <link>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Off-topic-Google-Authenticator-article/m-p/1013#M697</link>
      <description>&lt;P&gt;So this is largely mitigated by 2 step verification, content filtering that block malicious websites and context aware access. On Windows a robust Applocker policy and attachsurfacereduction rules will also help.&amp;nbsp; The default blocking of any form of Google login page will also help - whitelist only.&lt;/P&gt;&lt;P&gt;However, a well crafted web hook attack from your own country, could in theory, still cause you issues even if the above is in place.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Sep 2023 13:07:33 GMT</pubDate>
      <guid>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Off-topic-Google-Authenticator-article/m-p/1013#M697</guid>
      <dc:creator>rdnixon</dc:creator>
      <dc:date>2023-09-18T13:07:33Z</dc:date>
    </item>
    <item>
      <title>Re: [Off topic] Google Authenticator article</title>
      <link>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Off-topic-Google-Authenticator-article/m-p/1014#M698</link>
      <description>&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":smiling_face_with_sunglasses:"&gt;😎&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Sep 2023 14:05:01 GMT</pubDate>
      <guid>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Off-topic-Google-Authenticator-article/m-p/1014#M698</guid>
      <dc:creator>Kim_Nilsson</dc:creator>
      <dc:date>2023-09-18T14:05:01Z</dc:date>
    </item>
    <item>
      <title>Re: [Off topic] Google Authenticator article</title>
      <link>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Off-topic-Google-Authenticator-article/m-p/1016#M699</link>
      <description>&lt;P&gt;I don't think Google had any blame.&amp;nbsp; When they said how it happened (below) it's pretty obvious.&lt;/P&gt;&lt;P&gt;"The attack used a URL impersonating Retool's internal identity portal and was launched during a previously announced migration of logins to Okta.&lt;/P&gt;&lt;P&gt;While most of the targeted employees ignored the phishing text message, one clicked the embedded phishing link that redirected to a fake login portal with a multi-factor authentication (MFA) form.&lt;/P&gt;&lt;P&gt;After signing in, the attacker deepfaked an employee's voice and called the targeted IT team member, tricking them into providing an additional MFA code, which allowed the addition of an attacker-controlled device to the targeted employee's Okta account."&lt;/P&gt;</description>
      <pubDate>Mon, 18 Sep 2023 19:05:44 GMT</pubDate>
      <guid>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Off-topic-Google-Authenticator-article/m-p/1016#M699</guid>
      <dc:creator>panderson</dc:creator>
      <dc:date>2023-09-18T19:05:44Z</dc:date>
    </item>
    <item>
      <title>Re: [Off topic] Google Authenticator article</title>
      <link>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Off-topic-Google-Authenticator-article/m-p/1019#M700</link>
      <description>&lt;P&gt;Is it possible to have Google ask for two different authentications like Yubikey and/or Google Authenticator, and something else (SMS, voice call, etc.)?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Sep 2023 20:02:41 GMT</pubDate>
      <guid>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Off-topic-Google-Authenticator-article/m-p/1019#M700</guid>
      <dc:creator>panderson</dc:creator>
      <dc:date>2023-09-18T20:02:41Z</dc:date>
    </item>
    <item>
      <title>Re: [Off topic] Google Authenticator article</title>
      <link>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Off-topic-Google-Authenticator-article/m-p/1020#M701</link>
      <description>&lt;P&gt;No.&lt;/P&gt;&lt;P&gt;But I think there's a way to force 2FA even when using a Passkey, so accomplishing almost the same.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Sep 2023 20:50:55 GMT</pubDate>
      <guid>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Off-topic-Google-Authenticator-article/m-p/1020#M701</guid>
      <dc:creator>Kim_Nilsson</dc:creator>
      <dc:date>2023-09-18T20:50:55Z</dc:date>
    </item>
    <item>
      <title>Re: [Off topic] Google Authenticator article</title>
      <link>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Off-topic-Google-Authenticator-article/m-p/1022#M702</link>
      <description>&lt;P&gt;I would agree that the Google Auth wasn't the problem, or the point of entry. I think that was a targeted and directed (probably insider to some degree knowing the transition of platforms and being more common apparently) attack. I think when it comes to the companies internal systems, that's where they're blaming Google Auth Sync for syncing the OTP across devices.&lt;/P&gt;&lt;P&gt;I think they're saying (and maybe it is/was/will be a policy to not tell employees to not use Google Auth Sync now for this company) that if the account was compromised, and they used a different OTP authenticator platform (or just didn't sync to their Google account), their internal systems wouldn't have been compromised as well because the attackers wouldn't have access to them all in one account. I think that's the blame they're putting on Google. I don't think that's a difficult ask to have Google give Admins the ability to enable/disable the Sync functionality for their organization.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Edit: the end-user shouldn't have provided the additional MFA code. However, they did, so then the attacker would have been able to add the Google Auth Sync to a hostile device and sync all codes in the future.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Sep 2023 12:57:32 GMT</pubDate>
      <guid>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Off-topic-Google-Authenticator-article/m-p/1022#M702</guid>
      <dc:creator>alexgrutza</dc:creator>
      <dc:date>2023-09-19T12:57:32Z</dc:date>
    </item>
    <item>
      <title>Re: [Off topic] Google Authenticator article</title>
      <link>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Off-topic-Google-Authenticator-article/m-p/1023#M703</link>
      <description>&lt;P&gt;Not Google related but more SSO platform related (not Google SSO), the system may be able to be configured to ask for two.&amp;nbsp;&lt;/P&gt;&lt;P&gt;For example our SSO platform requires MFA to sign into the platform, and each app could be individually configured to require an additional MFA prompt (possibly SMS or Yubi) to access it.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Sep 2023 13:00:21 GMT</pubDate>
      <guid>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Off-topic-Google-Authenticator-article/m-p/1023#M703</guid>
      <dc:creator>alexgrutza</dc:creator>
      <dc:date>2023-09-19T13:00:21Z</dc:date>
    </item>
    <item>
      <title>Re: [Off topic] Google Authenticator article</title>
      <link>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Off-topic-Google-Authenticator-article/m-p/1064#M704</link>
      <description>&lt;P&gt;TOTP apps syncing is always a slippery slope, but as noted in this post, they are not the initial source of compromise. Besides Google, password managers Lastpass and Bitwarden also have TOTP apps embedded in their tools. Are there safer ways to backup your TOTP apps? Yes. Before Google Authenticator synced (yes, I use it), I backed up my codes to an old phone (no cell service) that lives in a drawer at home. Some print out the QR codes and put in a binder. This is a good example of ease of use vs security.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Sep 2023 16:33:15 GMT</pubDate>
      <guid>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Off-topic-Google-Authenticator-article/m-p/1064#M704</guid>
      <dc:creator>BrandonB</dc:creator>
      <dc:date>2023-09-21T16:33:15Z</dc:date>
    </item>
  </channel>
</rss>

