This content is viewable by Everyone

Aug 2025: QR CODE FIDO ATTACK

QR CODE FIDO ATTACK indicators

 

Threat Alert: QR CODE FIDO ATTACK

  • Fast Identity Online (FIDO) keys are currently one of the most secure forms of multi-factor authentication (MFA) because they cannot be easily duplicated and use cryptography. The open standards under FIDO include hardware keys, one-time passwords, and push notification authentication
  • Threat actors could use social engineering to authenticate via FIDO by luring users into scanning a QR code.
     

How is it used in the wild?

  • Threat actors could use the cross-device login function of a FIDO app to gain unauthorized password access to multiple accounts.
  • The attack begins with a phishing email requesting that end users log in via Okta. The users would then be directed to a fake Okta authentication page with adversary-in-the-middle (AitM) capabilities.
  • Users’ FIDO apps should have prevented the threat actor from logging into the account. However, the phishing page automatically sent the credentials to the legitimate Okta page and returned a QR code to the user. If scanned by the user without Client-to-Authenticator Protocol (CTAP) enabled, the threat actor could gain unauthorized access to the account.
  • While the attack successfully obtained password authentication, the MFA portion of all observed attacks failed due to FIDO specification requiring local proximity.

Key Action: Stay Alert!

  • Do not click on sign-on links in emails.
  • Check the URLs of any authentication page presented.
  • Be wary of QR codes.
  • Report ANY suspicious emails via Phish Alarm.