{"id":337,"date":"2015-07-12T15:14:27","date_gmt":"2015-07-12T12:14:27","guid":{"rendered":"https:\/\/www.protectimus.com\/blog\/?p=337"},"modified":"2019-06-11T14:57:34","modified_gmt":"2019-06-11T11:57:34","slug":"what-hides-beneath-sms-authentication","status":"publish","type":"post","link":"https:\/\/www.protectimus.com\/blog\/what-hides-beneath-sms-authentication\/","title":{"rendered":"What Hides Beneath SMS Authentication?"},"content":{"rendered":"<p>We have to pay for everything in life. Whatever you may call it \u2014 the law of conservation of energy, karma, or Divine Providence \u2014 that is how it is and how it will always be. In the 19th century, a postal courier loyal to his sovereign would risk his life delivering a letter to the addressee, which took up to a month, protecting it from any possible foes. In the 21st century, data exchange is carried out instantly, but it is a lot easier to \u2018break the seal\u2019.<\/p>\n<p>Cybercrime is increasingly on the rise. In 2013, in the USA alone over 3000 companies were victims of hackers\u2019 attacks. Forty million people suffered from the consequences of these crimes; 160 billion dollars was stolen. In 2014, the share of cyber crimes in the Russian Internet was 41% (11 thousand cases) of all the registered crimes in the IT environment. In early 2015, hackers\u2019 attacks on bitcoin exchanges sent shock waves through the community of holders of the cryptocurrency, which lost half of its value.<\/p>\n<div id=\"attachment_4754\" style=\"width: 360px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-4754\" class=\"wp-image-4754\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/07\/protectimus-sms-token-en-1.jpg\" alt=\"SMS-authentication\" width=\"350\" height=\"350\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/07\/protectimus-sms-token-en-1.jpg 400w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/07\/protectimus-sms-token-en-1-150x150.jpg 150w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/07\/protectimus-sms-token-en-1-300x300.jpg 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/07\/protectimus-sms-token-en-1-160x160.jpg 160w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/07\/protectimus-sms-token-en-1-240x240.jpg 240w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/07\/protectimus-sms-token-en-1-60x60.jpg 60w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/07\/protectimus-sms-token-en-1-184x184.jpg 184w\" sizes=\"auto, (max-width: 350px) 100vw, 350px\" \/><p id=\"caption-attachment-4754\" class=\"wp-caption-text\">SMS authentication<\/p><\/div>\n<p>According to the already mentioned law of conservation of energy (or money, in our case), online security and protection methods are also becoming more sophisticated. Regular passwords have been replaced with two-factor authentication. Banks\u2019 customers use it regularly when they receive one-time access codes via SMS messages. Admittedly, it is a step forward, but one can still trip over it.<\/p>\n<p>After a message is sent from a bank, it goes through a gateway and GSM network consisting of servers and transmission towers. That explains the relatively significant delay between pressing the Confirm Payment button and receiving the SMS message. Sometimes, it takes up to five minutes, which is a considerable amount of time by the standards of the 21st century: during this time, the SMS message can be intercepted and redirected, i.e. used for criminal purposes. Nowadays, hackers operate with automated hacker toolkits, and they can use the password in the SMS message in a split second. Not to mention the fact that some stages of the \u201cshort message\u201d transmission process are carried out by people. And, it is a well-known fact that big money can be quite a temptation. There is even a special term describing this vulnerability \u2014 \u201cman in the middle\u201d. It describes a situation when a hacker is \u201cin the middle\u201d between a bank and its customer.<\/p>\n<p>How can side effects of SMS authentication be neutralized? For example, it can be done via the two-factor authentication system offered by the company <a title=\"Protectimus\" href=\"https:\/\/www.protectimus.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Protectimus<\/a>. A one-time password generated by a special device called a token owned by a customer is sent to the server and compared to the password generated using the same algorithm and the same input parameters. The company offers four kinds of these devices, plus support for SMS- and email tokens. Moreover, passwords are generated using three algorithms:<\/p>\n<ul>\n<li>By event (a customer\u2019s pressing the token\u2019s button);<\/li>\n<li>By time (the token\u2019s internal clock is used);<\/li>\n<li>By request-response (one of the input parameters is the request from the server).<\/li>\n<\/ul>\n<div id=\"attachment_4755\" style=\"width: 360px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-4755\" class=\"wp-image-4755\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/07\/protectimus-token-en-1.jpg\" alt=\"Protectimus hardware token\" width=\"350\" height=\"350\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/07\/protectimus-token-en-1.jpg 400w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/07\/protectimus-token-en-1-150x150.jpg 150w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/07\/protectimus-token-en-1-300x300.jpg 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/07\/protectimus-token-en-1-160x160.jpg 160w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/07\/protectimus-token-en-1-240x240.jpg 240w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/07\/protectimus-token-en-1-60x60.jpg 60w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/07\/protectimus-token-en-1-184x184.jpg 184w\" sizes=\"auto, (max-width: 350px) 100vw, 350px\" \/><p id=\"caption-attachment-4755\" class=\"wp-caption-text\">Hardware TOTP token<\/p><\/div>\n<p>The reliability of the system is verified by the Initiative for Open Authentication certificate, which puts any solution complying with its requirements to various tests. Besides, the products offered by Protectimus are continuously improved. Recently, the data mining analysis has been developed and is currently being used. In short, it is a process of verifying a user\u2019s authenticity by the user\u2019s \u2018virtual environment\u2019. The company\u2019s plans include adding the biometric authentication factor.<\/p>\n<p>Why is it convenient for banks? Firstly, there are two solution options to choose from:<\/p>\n<ul>\n<li>Use the so-called SaaS \u2014 software as a service (for example, cloud services Google \u2014 Docs, Drive);<\/li>\n<li>Integrate the Protectimus platform into the existing security system (a flexible application programming interface will ensure the ease and simplicity of this process).<\/li>\n<\/ul>\n<p>Secondly, the intuitive user interface is adequately reflected in various types of devices (computer, Smartphone, tablet).&nbsp;Thirdly, the developers provide customers with complete documentation and comprehensive support.<\/p>\n<p>And, fourthly, it is all about the money, of course. As compared to the competitors\u2019 prices, the cost of owning the Protectimus system is half as much. In absolute terms, one of the token types costs less than ten dollars, and the service costs start at one dollar per month for one token. The customers get a comprehensive systematic approach to solving problems related to data security, full-scale authentication management, as well as event monitoring systems and emergency notifications. All the features are available on the <a href=\"https:\/\/www.protectimus.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">project\u2019s website<\/a> in the full-scale demo mode (when you register in the system, you also receive 25$ in your account).<\/p>\n<p>Yes, we have to pay for everything in life. However, when big money is at stake \u2013 and, as a result, your customers\u2019 peace of mind and your company\u2019s reputation \u2013 it makes more sense to pay to ensure protection than to pay as a regrettable consequence of lacking system security.<\/p>\n<span class=\"et_bloom_bottom_trigger\"><\/span>","protected":false},"excerpt":{"rendered":"<p>Nowadays, hackers operate with automated hacker toolkits, and they can use the password in the SMS message in a split second. Not to mention the fact that some stages of the \u201cshort message\u201d transmission process are carried out by people. And, it is a well-known fact that big money can be quite a temptation. But how can side effects of SMS authentication be neutralized? For example, it can be done via the two-factor authentication system offered by the company Protectimus.<\/p>\n","protected":false},"author":4,"featured_media":4848,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[7],"tags":[16,118,10,130,99],"class_list":["post-337","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-industry-news","tag-2fa","tag-data-protection","tag-otp","tag-sms-authentication","tag-two-factor-authentication"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/337","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/comments?post=337"}],"version-history":[{"count":6,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/337\/revisions"}],"predecessor-version":[{"id":4849,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/337\/revisions\/4849"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media\/4848"}],"wp:attachment":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media?parent=337"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/categories?post=337"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/tags?post=337"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}