Curious to get thoughts from people with subject matter expertise in passwords and MFA. The Retool people are saying that a feature turned on by default in Google Authenticator made what would have been a less-serious breach much, much worse. Yes, I know that the REAL moral of this story is to use FIDO, but I'm still interested in understanding how valid Retool's criticism is. "The caller claimed to be one of the members of the IT team, and deepfaked our employee’s actual voice. The voice was familiar with the floor plan of the office, coworkers, and internal processes of the company. Throughout the conversation, the employee grew more and more suspicious, but unfortunately did provide the attacker one additional multi-factor authentication (MFA) code. The additional OTP token shared over the call was critical, because it allowed the attacker to add their own personal device to the employee’s Okta account, which allowed them to produce their own Okta MFA from that point forward. This enabled them to have an active GSuite session on that device. Google recently released the Google Authenticator synchronization feature that syncs MFA codes to the cloud. As Hacker News noted, this is highly insecure, since if your Google account is compromised, so now are your MFA codes." "The fact that Google Authenticator syncs to the cloud is a novel attack vector. What we had originally implemented was multi-factor authentication. But through this Google update, what was previously multi-factor-authentication had silently (to administrators) become single single-factor-authentication, because control of the Okta account led to control of the Google account, which led to control of all OTPs stored in Google Authenticator. We strongly believe that Google should either eliminate their dark patterns in Google Authenticator (which encourages the saving of MFA codes in the cloud), or at least provide organizations with the ability to disable it. We have already passed this feedback on to Google."
@b902f84f I am no fan of Google but Google Authenticator requires user interaction to upload OTPs to the cloud and the interaction is surprisingly clear.
One of the problems I'm having is parsing the phrases "the fact that Google Authenticator syncs to the cloud" and "saving of MFA codes in the cloud." Authy and other authenticator apps do the same thing. Isn't the real complaint that the seeds get synced to the Google account?