Beware the Hype: New Claims of Passkey Vulnerabilities Under Scrutiny
In a striking example of the alarmism that can emerge from cybersecurity marketing, a recent report from SquareX—a startup specializing in browser security—asserts the existence of a significant vulnerability involving passkeys. This claim potentially undermines the security frameworks established by major technology firms, including Apple, Google, and Microsoft, all of which have vigorously promoted the adoption of passkeys as a more secure authentication method.
The term “Passkeys Pwned” refers to a cybersecurity technique showcased in a Defcon presentation earlier this month. The attack operates through a malicious browser extension, previously installed via social engineering, designed to subvert the process of creating a passkey for services like Gmail and Microsoft 365, among many others that utilize this enhanced authentication method.
Behind the scenes, the compromised extension enables the creation of a keypair that is incorrectly tied to the legitimate domain of gmail.com; however, this keypair is generated by the malware, placing control in the hands of an attacker. Such a breach raises alarms about the integrity of cloud applications that house sensitive organizational data, emphasizing that traditional credential theft tactics can still find success in this changing landscape.
SquareX’s researchers claim this revelation dismantles the prevailing myth that passkeys remain impervious to theft. They suggest that “passkey stealing” may be just as manageable as conventional credential theft, highlighting that while passkeys are perceived as more secure, this perception may lack the robustness gained through extensive historical scrutiny and long-term resilience in various security contexts.
The implications of this development extend beyond the technical arena, raising critical considerations for business owners concerned about safeguarding sensitive information against evolving threats in cybersecurity. While the security advantages of passkeys are acknowledged, this newfound vulnerability serves as an urgent reminder that newer technologies may still harbor exploitable weaknesses.
From a cybersecurity strategy perspective, one must consider the MITRE ATT&CK framework to analyze the tactics and techniques that could have enabled this vulnerability. Initial access through social engineering, persistence via sustaining the malicious extension, and potential privilege escalation through the unauthorized control of the passkeys represent critical phases in this type of attack.
As organizations continue to embrace advanced authentication methods such as passkeys, it is imperative to maintain heightened vigilance against evolving threats. The findings presented by SquareX underscore the necessity of continual assessment and refinement of security protocols, ensuring they are resilient against both novel and traditional cyber threats.