Dual passwords can keep phishers at bay

 

Connecting state and local government leaders

The all-too-easy hack of South Carolina's Department of Revenue could have been prevented by a dual-password system. How does it work?

The system that South Carolina’s Department of Revenue is adopting reportedly will cost just $25,000- a bargain, considering that the state is paying $12 million to help residents buy protection for their potentially compromised Social Security numbers and financial information. South Carolina officials aren't saying what dual-authentication system it will use for fear of tipping off hackers. It has only revealed that Mandiant http://www.mandiant.com/products/mcirt-managed-defense/ Corp. is doing at least some of the implementation work.

After South Carolina’s Department of Revenue was hacked in November, exposing 3.8 million Social Security numbers, 387,000 credit and debit card numbers and 657,000 business tax filings, state officials announced plans to implement a dual-authentication password system to better protect information.

What the state had at the time of the attack offered next to no security: a single-password security system, with almost none of the data encrypted.

A simple phishing attack gained access to one employee’s user name and password, and the hackers were off to the races, allegedly accessing the financial system at will for well over a month before the hack was discovered, according to The State newspaper.

Federal agencies have two-factor authentication, the second factor in the form of a token such as a Personal Identity Verification card (civilian agencies) or Common Access Card (defense). But public-sector agencies without that kind of protection could turn to dual password systems.

There are two main dual-authentication password systems in use today, outside of  biometrics.

The method frequently used by banks, online games and any site with high-value transactions is called one-time password. It’s almost always used as a second line of defense behind the usual name and password protection. The key is that the second password changes very often, sometimes as quickly as every minute, but certainly no less than every 90 seconds. A security server uses a mathematical algorithm to keep changing the password. Of course, users need to know that changing password, and this information is given to them via a portable device that can both keep track of time and has the same mathematical formula as the server. So the mobile device and the security server come up with the same numbers at the same time.

For a user to get access to a protected system, he has to enter the right password at the right time. Some fancy password systems include a USB key or a smart card as part of the mobile device, and a user has to insert the token into a system he is using to access the data, whereby the password is automatically applied.

If the password on the token matches the current one on the security server, access is granted. This makes it almost phishing-proof because even if a user somehow gives out the second password, it’s only valid for a very short time. And in the case of the automatic passwords, a user probably never actually knows what the rotating passwords are. He just inserts his key to gain access. A phisher or hacker who gains the primary password doesn’t get into the system, and attempts to break the second password after the first is approved will trigger alarm bells in any halfway decent monitoring setup.

The second method involves encrypting all files and folders with a program such as BitLocker,  in which encryption acts like the second password. If a hacker is able to access a system, say, by using a phishing attack, he still doesn’t get anywhere. All the files will be encrypted gibberish.

The value of this system is that even if someone steals all of the files, he likely won’t be able to make use of them because of the encryption protecting the data. It also makes data monitoring systems more effective because they can detect if someone accesses a system properly, but then runs into walls each time he tries to use a file.

In truth, a system like the one in South Carolina that protects Social Security information and tax records can never be too protected. It should probably have both secondary password methods in use, for a triple-security login, plus system monitoring. But either of the two methods alone would have stopped the rather unsophisticated attack on the South Carolina system had it been in place at the time of the breach. The state just made it easy for the hacker, and provided a valuable lesson in what not to do.

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.