•  stoy   ( @stoy@lemmy.zip ) 
    link
    fedilink
    English
    82 months ago

    The attacker would need physical possession of the YubiKey, Security Key, or YubiHSM, knowledge of the accounts they want to target and specialized equipment to perform the necessary attack. Depending on the use case, the attacker may also require additional knowledge including username, PIN, account password, or authentication key.

    Meh, doesn’t seem that realistic of an attack yet, but I know that could change.

    •  Sonori   ( @sonori@beehaw.org ) 
      link
      fedilink
      English
      3
      edit-2
      2 months ago

      To be fair given some of the places and things YubiKeys protect, especially local government, finance, hospitals, and the like, this is one of the cases where a physical attack isn’t beyond the realm of possibility. I’m not cloning a Yubikey with specialized kit to break into a small business, but if it plus a password lets me log in as an accountant at an bank or investment firm on the target’s day off, well then it might be worth it for an attacker.