Q
Problem solve Get help with specific problems with your technologies, process and projects.

Can Vawtrak banking malware bypass two-factor authentication?

Banking malware Vawtrak has the capability to bypass two-factor authentication. Expert Nick Lewis explains how Vawtrak works and how to stop it.

I know the importance of additional authentication measures, but I'm seeing reports of banking malware that can...

now bypass two-factor authentication. How does this banking malware work, and what should enterprises do to defend against such threats?

Banking malware Vawtrak has functionality to bypass two-factor authentication included in its code. It doesn't actually exploit a vulnerability in the two-factor authentication mechanism itself, but instead uses social engineering to trick the user into entering the 2FA token code so the malware can capture it and use it on the website attackers are targeting. Vawtrak infects a user's endpoint device and modifies the targeted financial institution's webpage that generates a phony prompt for the 2FA token.

Financial institutions under attack by this type of banking malware could potentially detect the suspicious activity and then block any financial transactions via infected devices. The suspicious activity could be, for example, a user navigating through a bank's webpages faster than an actual person would, indicating that malware on the user's endpoint is performing the actions.

Users can defend against malware that can attack or bypass two-factor authentication systems by preventing it from infecting their endpoints with antimalware protection. Enterprises could require users that perform financial transactions make them from a secure endpoint or secure remote system. Enterprises could also use a network based antimalware device to block the command and control communications for the malware. The 2FA system could also require the user to re-authenticate periodically during a transaction. However, an updated version of the malware could adapt to capture any new tokens or codes generated by the reauthentication system, so financial institutions will need to remain vigilant.

Next Steps

Discover how Vawtrak malware blocks enterprise security software

Learn how monitoring for unusual network traffic can detect banking botnets

Find out why the Carbanak banking malware attack caused nearly $1 billion in losses

This was last published in January 2016

Dig Deeper on Two-factor and multifactor authentication strategies

PRO+

Content

Find more PRO+ content and other member only offers, here.

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

Join the conversation

1 comment

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

How does your organization monitor for two-factor authentication attacks?
Cancel

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close