Unskilled Cyber Criminals win with AI
The advancement of deep fakes makes biometric authentication weaker due to the ability of sophisticated AI-generated media to convincingly replicate physical traits such as facial features, voices, and even behavioural patterns. Deep fakes can create realistic images and videos of individuals, potentially allowing attackers to spoof biometric systems that rely on facial recognition, voice recognition, or other biometric data. This undermines the reliability of biometric authentication, as the systems may be tricked into granting access based on these forged credentials.
Industry leaders and cybersecurity experts have highlighted these concerns. Gaelan Woolham from Capco points out that deepfake technology can mimic voices and faces with high fidelity, making it challenging for existing biometric systems to distinguish between real and fake identities. This technology can bypass voice biometric systems used by financial institutions, as demonstrated by a University of Waterloo study which showed that deepfakes could fool such systems in a few attempts (Capco-Homepage).
Moreover, Sensity, a security company, tested facial recognition systems and demonstrated that deepfake technology could easily bypass liveness detection—a critical component of facial recognition security (1Kosmos). Liveness detection typically relies on recognizing natural human behaviours like blinking and subtle facial movements, but deepfakes can replicate these actions convincingly.
The recent significant development is the easy deployment by non-experts; making it easier for individuals to create realistic fake videos and images, including those used for biometric cloning. The availability of sophisticated yet user-friendly applications such as FakeApp, ReFace, and DeepFaceLab has democratized access to deepfake creation tools, allowing even non-experts to produce convincing fakes (BioID).
Deepfakes can pose serious threats to biometric authentication systems, especially those that rely on facial recognition. These attacks can be categorized into presentation attacks, where fake images or videos are presented to a camera or sensor, and injection attacks, where data streams or communication channels are manipulated. Examples of deepfake attacks include face swapping, lip-syncing, and gesture or expression transfer, all of which can deceive biometric systems (1Kosmos)
The ease with which deepfakes can be created and the increasing sophistication of these technologies highlight significant vulnerabilities in biometric authentication. As deepfakes become more realistic, the challenge of detecting and preventing such attacks grows, making traditional biometric systems potentially less reliable without additional security measures like liveness detection and multi-factor authentication.
These biometric vulnerabilities have a direct impact on other forms of Multi-factor Authentication (MFA) like Authentication mobile Apps or ”Password-less” methods. The often ignored but most important main facilitator in this threat is that most MFA installations are accomplished by self-provisioning, for example by receiving an email link to download the App that helps installs the process.
Most CEOs have been encouraged to extend their public social profile by giving presentations or announcements in posts on public platforms. Eleven Labs (Eleven) can make a passable cloned voice with 60 secs of any training audio, can refine pitch, rate and add custom phonemes and have text input generate the appropriate audio. Consider a call from the Attacker’s text to the generated cloned CEO voice made to the Help Desk Assistant requesting set up of new phone or wanting an email link to re-establish their MFA.
CIOs are mandated to use MFA methods for privileged access but selecting what MFA methods are appropriate and how best to deploy them are crucial decisions and need considered evaluation.
Trends in Cyber Security for 2024
The Cybersecurity landscape is constantly shifting, making it difficult to be sure what will be the most challenging top threats. However, based on current trends and expert predictions, I have tried to highlight the major categories of Cybersecurity Threats we’re likely to face in 2024:
I AM SPARTACUS
I AM SPARTACUS
Does your Identity Management System rely on User identifiable information to on-board? Many 2-Factor Authentication methods are self-provisioning, often relying on an email link or mobile number which can be found by social engineering and make Attacker re-instatement straightforward service from the Help Desk Assistant. Note that FIDO type devices have an open specification and if the validation of the Attestation Key is bypassed by User choice, Browser setting or a planted Browser Extension, a forged device succeeds. CASQUE does not need User identifiable information, has no self-provisioning and a CASQUE token cannot be cloned.
Pros & Cons of Identity as a Service
Although written from a self proselytising viewpoint there are worthwhile generic arguments here (click for link to pdf)
WordPress Threats
WordPress powers 43% of all the websites, using CASQUE MFA eliminates third party threats
Until now, two intractable problems persist to cause damage; the Insider threat and the risk caused by the lag between a breach occurring and its detection.
CASQUE is the only solution that addresses these two difficult problems. CASQUE is not exposed to the vulnerabilities inherent in current Authentication methods whose weaknesses provide convenient excuses for disaffected Insiders to deny their, or their collaborators, illegitimate access. CASQUE is the ultimate deterrent against Insider Attack, denying repudiation of access. The second major delivery is the immediate detection of a breach – the exposure time to detection currently averages 9 months and amplifies damage potential. CASQUE can detect clones immediately, allowing breaches to be instantly detected and recovered.
Existing WordPress sites can be easily updated to require CASQUE Multi-factor Authentication for Administrator access.
Quis custodiet ipsos custodes?
The recent Uber breach is distinguished by the shock of its ordinariness.
Most Privilege Account Management products control access to the credentials of Privileged Accounts by hiding them in a secure vault. Of course, its not a good idea to have the access to the vault controlled by Multi-factor Authentication methods that are themselves vulnerable as amplified in this short YouTube clip.
Self-provisioning MFA
Self-Provisioning-the gift that keeps giving
If your MFA rollout is based on self-provisioning, it may have intrinsic vulnerabilities.
According to Mandiant, Hackers exploited this to gain access to a Microsoft Azure Account, here is the link: https://www.mandiant.com/resources/blog/apt29-continues-targeting-microsoft.
The ease of “Passwordless” Authentication has been enthusiastically promulgated especially for Smartphone users which usually involves biometric self-enrolment, but using the Smartphone as the client and having the same Smartphone as the means for Authentication cannot really claim to be “Multi-factor”.
Showcase of the best UK Business
Recently featured in the Showcase of the best of British business.
This is the link to a recent interview with Basil Philipsz, CEO and founder of Distributed Management Systems.
Kalkine Interview
Kalkine Media is an Investor Relations Group and Media House that operates at a global level across different geographies, with the latest developments across equity markets, debt markets, currency markets and commodity markets. Distributed Management Systems CEO, Basil Philipsz, has been featured in their “Expert Interviews” series see https://youtu.be/oqkp0WJlYrM
Insider Threat
The Insider Threat is current and invidious as OKTA can recently testify.
The bigger the organisation the more likely to have a disaffected employee or subcontractor driven by the persistent human frailties of Ideology, Revenge, Greed.
You need to know who is trying to access your data crown jewels., but the current methods of Multi-factor Authentication are weak and so provide convenient excuses for disaffected Insiders to deny their or their collaborators illegitimate access.
CASQUE provides a powerful deterrent against such repudiation and because it does not rely on keeping fixed secrets, there is nothing useful for a hacker to discover or for a complicit Insider to disclose.- see YouTube clip.