Cybersecurity researchers have helped fix an issue with Box that could have been exploited to bypass multi-factor authentication (MFA) for accounts that relied on authenticator apps such as Google Authenticator.
The popular cloud storage company was alerted by researchers at Varonis after they found a relatively simple workaround to use stolen credentials to log into a Box account without providing a time-based one-time password (TOTP).
According to the researchers, Box allowed users access to some areas of the account after verifying their login credentials, but before entering the TOTP. They demonstrated a mechanism that allowed them to unenroll a user from MFA after providing a username and password but before providing the second factor.
We're looking at how our readers use VPNs with streaming sites like Netflix so we can improve our content and offer better advice. This survey won't take more than 60 seconds of your time, and we'd hugely appreciate if you'd share your experiences with us.
“MFA is a step towards a safer internet and more resilient authentication for the SaaS [Software-as-a-Service] apps we rely on, but MFA isn’t perfect. There has been a massive push towards TOTP-based MFA, but if there are any flaws in its implementation, it can be bypassed,” point out the researchers.
In addition to demonstrating the workflow for bypassing TOTP to log into a compromised account, the researchers also took the opportunity to make a few suggestions for businesses looking to introduce MFA.
For one, Varonis suggests that, in addition to requiring MFA, businesses must also use single sign-on (SSO) wherever possible. They also ask businesses to enforce strong password policies, avoid using questions with easy-to-find answers as part of their authentication flows, and keep their eyes peeled for breached passwords from their domain on sites like HaveIBeenPwnd.
“The above example is simply one bypass technique for one SaaS platform. Many more exist—some of which we’ll publish soon,” conclude the researchers.