- Browsers are the weak hyperlink that attackers now exploit for management
- SquareX exhibits how trivial scripts can intercept and hijack passkey flows
- From a consumer’s perspective, faux passkey prompts look completely real
For years, the shift away from passwords towards passkeys has been framed as the way forward for safe authentication.
By counting on cryptographic key pairs as a substitute of weak or reused strings, passkeys promised to take away the dangers which have lengthy plagued password techniques.
Nevertheless on the current DEF CON 33 occasion, SquareX researchers introduced new findings which problem this view, claiming the very browsers relied upon to handle passkey workflows could be exploited in ways in which bypass their protections.
The mechanics of passkeys
Passkeys function by way of a system the place a non-public key stays on a consumer’s system whereas a public key’s saved by the service supplier.
To log in, the consumer verifies id domestically with biometrics, a PIN, or a {hardware} token, and the server authenticates the response in opposition to its saved public key.
This construction ought to remove most of the basic dangers, equivalent to phishing or brute drive assaults, but your entire course of assumes the browser serves as a reliable mediator, a task that SquareX researchers now argue is dangerously fragile.
They confirmed how attackers can manipulate the browser atmosphere with malicious extensions or scripts, permitting them to intercept the registration stream, substitute keys, and even trick customers into re-registering below attacker-controlled circumstances.
From the sufferer’s perspective, the login course of appears indistinguishable from a professional passkey operation, with no warning indicators that credentials are being compromised.
Established enterprise safety instruments, whether or not endpoint safety or community defenses, don’t present visibility into this stage of browser exercise.
“Passkeys are a extremely trusted type of authentication, so when customers see a biometric immediate, they take that as a sign for safety,” mentioned SquareX researcher Shourya Pratap Singh.
“What they don’t know is that attackers can simply faux passkey registrations and authentication by intercepting the passkey workflow within the browser. This places just about each enterprise and shopper utility, together with essential banking and knowledge storage apps, in danger.”
With the vast majority of enterprise knowledge now saved in SaaS platforms, passkeys are being quickly adopted because the default authentication methodology.
SquareX’s findings recommend this transition introduces a brand new dependency on browser safety, an space the place oversight has historically been weak.
Passkeys should still symbolize progress past conventional credentials, but the SquareX researcg exhibits no system is totally free from flaws, and organizations could have moved too rapidly to embrace passkeys as a common resolution.
keep protected
- Use a trusted antivirus to detect and block hidden malicious code.
- Set up extensions solely from verified sources and evaluation their permissions often.
- Maintain browsers up to date to make sure the most recent safety fixes are utilized.
- Make use of a password supervisor to securely deal with legacy accounts that also depend on passwords.
- Pair sign-in processes with an authenticator app to strengthen verification steps.
- Frequently audit browser settings to attenuate publicity to untrusted scripts or add-ons.
- Restrict the variety of units used for delicate logins to cut back assault alternatives.