- smeg ( @smeg@feddit.uk ) English54•15 days ago
The attacker would need physical possession of the YubiKey, Security Key, or YubiHSM, knowledge of the accounts they want to target and specialized equipment to perform the necessary attack. Depending on the use case, the attacker may also require additional knowledge including username, PIN, account password, or authentication key.
The attacks require about $11,000 worth of equipment and a sophisticated understanding of electrical and cryptographic engineering. The difficulty of the attack means it would likely be carried out only by nation-states or other entities with comparable resources and then only in highly targeted scenarios. The likelihood of such an attack being used widely in the wild is extremely low.
Given this massive caveat I’d almost call that headline misleading
- Hirom ( @Hirom@beehaw.org ) English11•15 days ago
Knowledge of the account is an obvious caveat. Yubikey-based MFA is an added layer of protection for accounts, so any kind of attack against MFA assumes the attacker already knows which account to target.
It’s like saying “our door lock is flawed, but the attacker would need to have knowledge of the door”.
The cost and complexity is what’s noteworthy and is more relevant. Although attack cost and complexity usuallu goes down with advances in tooling and research. So it may be a good idea to plan a progressive retirement of affected keys.
- Zwiebel ( @Zwiebel@feddit.org ) English1•14 days ago
“Our door lock is flawed, but the attacker would need physical access to the key”
- lightnsfw ( @lightnsfw@reddthat.com ) English4•15 days ago
Cheaper just to beat you until you give them what they want.
- /home/pineapplelover ( @pineapplelover@lemm.ee ) English4•14 days ago
I spent so much on these keys wth
- melroy ( @melroy@kbin.melroy.org ) 3•15 days ago
Overrated…
- MaxHardwood ( @MaxHardwood@lemmy.ca ) English1•14 days ago
Despite this affecting only FIDO and barely any Yubikeys are being used for that, it’s important to keep in mind that exploits and attacks get worse over time. For now it’s just FIDO and requires complex hardware and practically destroying the key. I wouldn’t be surprised if this exploit is just the beginning.
- tkw8 ( @tkw8@lemm.ee ) English0•15 days ago
Is this because FIDO2 is flawed, the yubikey hardware design is flawed or both?
- harsh3466 ( @harsh3466@lemmy.ml ) English0•15 days ago
It’s due to a cryptographic library implementation in a controller used in the yubikey. It’s a third party controller, and this isn’t exclusive to yubikeys either, a shitload of other stuff uses the same controller and is likely vulnerable to the same attack.
Also, the attack requires around $10k worth of equipment and physical access to the yubikey, so while a valid attack vector, it’s also not something to get into a panic about.