8 Passwordless Login Security Mistakes and How to Avoid Them

8 Passwordless Login Security Mistakes and How to Avoid Them

1 Star2 Stars3 Stars4 Stars5 Stars (4 votes, average: 5.00 out of 5)
Loading...

Identity Defined Security Alliance (IDSA) reports that nearly 85% of identity stakeholders were directly impacted by identity-related security incidents in 2023. Protect your data and systems by learning eight passwordless login security mistakes and how to avoid them

$5,479,819. This is the average cost organizations spent on data breaches caused by insecure authentication in 2023. It’s enough to easily bankrupt many businesses. To make matters worse, the same Hypr report confirms that authentication-related attacks affected 69% of the firms polled. 
 
Adopting passwordless login solutions can help organizations mitigate the risks associated with traditional password-based access. But, if incorrectly implemented, these solutions can do more harm than good.
 
As the character Rocky Balboa said in one of his namesake movies: “The world ain’t all sunshine and rainbows.” So, let’s explore the most common passwordless security login mistakes to avoid and a few tips that’ll protect you from most of the digital world’s nasty storms.

Learn the Advantages and Disadvantages of Passwordless Authentication

Related: The Pros and Cons of Passwordless Authentication

7 Passwordless Login Security Mistakes and How to Avoid Them

Passwordless login solutions are a wonderful way to verify your users’ identities without requiring them to type their passwords. This method replaces passwords with more secure alternatives such as:

  • Client certificates (i.e., personal authentication certificates),
  • Biometrics (e.g., fingerprint, retina scans),
  • One-time passwords (OTPs), or
  • PINs.

Here’s a quick overview of several of the most common passwordless security mistakes people make and what you can learn from them:

Passwordless Login MistakesPasswordless Login Issue ExamplesSolutions
‍1. Skipping Users and Customers’ Identity ProofingNot verifying a user’s identity before granting him access to a new app or resetting a password.Follow NIST digital identity guidelines, use different verification methods, and manage identities correctly.
2. Insecurely Handling Your Certificate’s Private KeysStoring keys as plain text files, using the same key for multiple servers, sharing keys, and no key rotation.Use unique keys, rotate them frequently, and store them securely with secure hardware.
3. Opting for Less Secure Authentication FactorsCarelessly using magic links, OTP, SMS, push notifications, and biometrics.Implement a PKI certificate-based passwordless login solution.
4. Underestimating Cybercriminals and Technology AdvancementsDisregarding the dangers of social engineering and generative AI-based attacks.  Opt for reliable biometric devices/software, certificate-based passwordless logins, backup authentication solutions, and have a backup of your key-related data.
5. Not Having a Plan B in Place for “Murphy’s Law”Lacking protections in case devices are stolen or lost.  Use encryption and remote wipe software, and have a secondary passwordless login solution.
6. Assuming That There Won’t Be Any Technical Issues Once ImplementedIgnoring biometric devices, network connections and software update-related issues.Frequently test passwordless logins, and have an authentication backup and a remediation plan in place.  
7. Neglecting Security MisconfigurationsOverlooking Software misconfigurations and default credentials. Personalize usernames, passwords, error messages, and settings, and disable unused features.
8. Ignoring Updates and VulnerabilitiesSticking to legacy or unpatched systems and skipping vulnerability checks.Keep all systems up to date and patched, and use automated security check tools like SiteLock and HackerGuardian.

1. Skipping Your User’s Identity Proofing

Of course, you know who your employees are. You’ve personally hired Bob, and you see him nearly every day in the office. So, why should you waste time verifying his identity again before giving him access to a new app?

Because if Bob works from home one day and asks to get access to a new application containing sensitive information, how can you be sure that’s really Bob requesting it and not an attacker? Hint: you can’t unless you verify his identity.

Are we being paranoid? Maybe. But this very concern may have contributed to MGM’s troubles and woes in September 2023. According to VX-Underground, an attacker impersonated an MGM employee to convince the support team to give him the credentials to access the corporate system. MGM reported in its SEC 8K filing that this attack led to:

  • A massive data breach.
  • $100 million in earnings losses.
  • $10 million in one-time remediation-related expenses and legal fees.
A screenshot of a tweet from VX-Underground's X channel.
Image caption: A screenshot from VX-Underground discussing the MGM social engineering-based data breach.

3 Solutions to Overcome This Passwordless Login Security Mistake

Become a doubting Thomas and prevent social engineering attacks on new accesses and password resets by:

  • Following identity proofing guidelines. Choose among the three security levels described in the National Institute of Standards and Technology (NIST) Digital Identity Guidelines.
  • Verifying your user’s identity via a combination of different elements. For instance, combine face-to-face video conferences, location detection, or document verification with behavioral analytics.
  • Correctly managing digital identities. Ensure the digital identities of your customers and other users are properly managed, respecting data privacy and security regulations.

2. Insecurely Handling Your Certificate’s Private Keys

Cryptographic private keys and the digital certificate saved on the user’s device are at the basis of public key infrastructure (PKI) certificate-based authentication.

Here, we won’t go into the technical nitty-gritty of how PKI and certificate-based passwordless logins work, but you can get an overview from the graphic below:

A basic example of PKI certificate-based authentication as a means of passwordless authentication
Image caption: This simplified graphic shows an overview of how PKI certificate-based passwordless authentication works. The process also involves exchanging information relating to cryptographic ciphers and keys, which are then used to establish a secure, encrypted connection.

However, the complex validation process and the fact that the private key is never sent to the server makes it one of the most secure passwordless login methods (more on this in a moment). As long as the private key remains private. But what if it doesn’t?

Image caption: A stolen private key can jeopardize your passwordless login security.

Examples of These Passwordless Security Issues

A stolen private key and mistakes like the ones listed below could spell the end of your passwordless login security.

  • Storing keys in plaintext files or on unprotected servers. Private keys are like passwords. They shouldn’t be saved in plaintext or on unprotected servers as anyone can access text files.  
  • Using the same key for more than one server or service. It can be convenient, but a private key should never act as a passepartout. Imagine if it’s stolen. Jackpot. The bad guy can roam free all over your network and systems undetected.
  • Sharing your keys or giving access to them to anyone. SSH passwordless login lets server administrators (and anyone with the same keys, including cybercriminals) access Linux servers without a password. In this case, “sharing is not caring.”
  • Avoiding key rotation. 45% of businesses surveyed by Microsoft haven’t rotated their AWS access keys in more than six months. An inexistent or long key rotation period facilitates the attacker’s work and increases the risk of data breaches. Unfortunately, this useful approach is often overlooked and isn’t done as often as it should be.   

4 Solutions to These Passwordless Login Security Issues

Prevention is always better than cure. Secure your passwordless logins by doing the following:

  • Store all your private keys on hardware security modules (HSMs). This ensures the keys are securely stored while allowing authorized users to access them to perform tasks.
  • Use one key for one server/service. This way, if one private key is compromised, the attacker will only get access to that one server or service.
  • Minimize the chances of breaches and unauthorized access. You can do this by implementing access controls and limitations regarding your cryptographic keys and other secrets (i.e., the principle of least privilege).
  • Frequently rotating private keys. This approach is recommended by the National Institute of Standards and Technology (NIST).

3. Opting for Less Secure Authentication Factors

Client certificates aren’t the only authentication factor for passwordless logins. There is a broad range of other methods that can be used. But not all of them are as secure as they seem. For instance:

Magic Links

You get an email with a unique link that includes a token. When you click on it, the server verifies and saves the token as a cookie on your browser. Abracadabra! You’re now signed in using a magic link.

But what if the email is intercepted through a man-in-the-middle attack? Or if a cybercriminal sends you a phishing email with a phony magic link redirecting you to a malicious website? Malware infection and data breaches are just around the corner. 

Two example screenshots of emails containing magic links that alow users to engage in a form of passwordless authentication using tokens

Image caption: Two examples of magic links a colleague and I received via email.

OTP, TOTP, SMS, and PINs

In July 2024, Zimperium warned that over 600 global brands were infected by SMS Stealer, a malicious software that steals one-time passwords (OTPs) sent via text messages. SMSes aren’t encrypted and can be intercepted or spoofed in no time. The video below says it all. Some developers got hold of a time-based OTP (TOTP) and used it to steal a Tesla car (please, don’t do this at home).

Push Notifications

These are those login notifications you get on your authentication app or hardware token asking you to approve or deny access to an app/system with a click. It’s simple, user-friendly, and resistant to phishing (albeit the message can still be intercepted). Your device could be lost or stolen. Furthermore, believe it or not, governments can use push notifications to spy on you.

Biometrics

OK, hopefully, no bad guy would go as far as cutting off your finger or scooping out your eyeball to access your apps. (This isn’t the movies, after all.) Yet, biometrics aren’t exempted from attacks. In the second half of 2023, IProov detected 704% more face swap injection attacks than those recorded in the first half. We’ll dig deeper into this in the next point. For now, let’s see how we can fix this.

Ward Off These Passwordless Login Security Issues With Certificate-Based Authentication 

A PKI certificate-based passwordless login solution is your best bet against cutting-edge attacks. The authentication happens automatically without the user’s input. Secrets are replaced by a more secure digital certificate confirming your identity as an individual, issued by a trusted certificate authority (CA) and the user’s private key.

This way, attackers have nothing to phish, spoof, or fake to gain access to your company’s secrets and systems. To set up certificate-based authentication:

4. Underestimating Cybercriminals and Technology Advancements

95% of IT leaders interviewed by Keeper Security reported that cyber attacks are becoming more sophisticated. 51% confirmed their organization suffered an artificial intelligence (AI) attack in 2023.

Nowadays, generative AI can be used by anyone for virtually any purpose. From translations to generating credible videos and pictures, it’s a cheap and fast solution that requires no technical skills. AI also makes generating malicious code, phishing, and social engineering attacks practically child’s play.

Turning a blind eye to these threats will make your passwordless login vulnerable to:

  • Sophisticated phishing attacks. A tell-tale sign of phishing messages were grammatical mistakes, poor spelling, and typos. Then ChatGPT came to light. Et voila. Cybercriminals can now use it to generate grammatically correct, believable phishing emails in seconds.
  • Voice simulation. Microsoft demonstrated that its new VALL-E text-to-speech AI model can simulate anyone’s voice with only three seconds of audio. Do you think that this is bad? Real-time voice changer software is even worse. These tools let anyone change their voice to sound like someone else in real time and use it for SIM swap attack.
A basic diagram that illustrates how a SIM swapping attack can happen as the result of bad guys using generative AI tools
Image caption: Voice simulation AI tools can facilitate SIM swap attacks.
  • AI Image and video. Do you like playing with image morphing and AI video-making tools? I’ll tell you a not-so-secret secret: the bad guys like it, too. They often use it to inject manipulated videos into authentication systems (face swap injections). Access granted!
  • Vulnerabilities exploitation. A recent study shows that ChatGPT-4 can successfully autonomously exploit 87% of one-day vulnerabilities without too much effort. Yup. ChatGPT never stops surprising us.

3 Ways to Bypass This Passwordless Login Security Issue

Agatha Christie once said, “To every problem, there is a most simple solution.” And she was right.

  • Opt for high-quality and reliable biometric devices and software. It’ll enable you to spot and stop even the most advanced attacks.
  • Ensure you have one or more backup authentication solutions. This way, if one is compromised or has a vulnerability, your users can switch to another one.
  • Leverage the power of digital trust with certificate-based passwordless logins. 91% of IT professionals polled by KeyFactor in 2023 say that strong PKI management is key to protecting organizations from AI threats.

Last but not least, always back up your data.

5. Not Having a Plan B in Place for “Murphy’s Law”

As the saying goes: “Anything that can go wrong will go wrong.” So, what will you do when a device is stolen or hijacked (in case of SIM swapping) or when things simply go wrong?
 
Once the device is lost or stolen, the attacker who finds it (or steals it) can use it to bypass the passwordless login and get a free ticket to your organization’s network, email, and all your employee’s accounts.

Let’s have a look at some recent statistics.

  • In 2023, nearly 52,000 mobile devices were stolen in London alone.
  • The United Kingdom’s Ministry of Defense (MOD) confirmed that nearly 400 devices were lost or stolen between November 2022 and November 2023.

6. Assuming There Won’t Be Any Technical Issues Once Implemented

Technical issues or errors could impact the security, performance, or availability of any passwordless logins. This could negatively affect your operations and bottom line, underscoring the importance of taking steps now to prevent these issues. For example:

  • Biometric devices could malfunction,
  • Network connections could fail, or
  • A buggy software update could mess your systems up.

Just look at what happened with the latest Microsoft/CrowdStrike update in July 2024. It crippled over 8.5 million devices worldwide and caused major disruptions. Class actions have been filed by investors and travelers. OK, maybe a sloppy update won’t cause the same level of damage to your passwordless login security solution, but you got the picture.

Dodge This Passwordless Login Security Error by Implementing These 3 Solutions

Mitigate future risks and guarantee 100% login availability to your users by:

  • Frequently testing all passwordless login methods and systems used. Monitoring systems will let you immediately spot and fix anomalies and potential issues.
  • Running a risk assessment and using the outcome to generate an action plan. The NIST Cybersecurity Framework (NIST CSF 2.0) is an excellent resource full of tips and best practices that can be applied even to small and medium businesses.
  • Having backup passwordless login methods in place. This is The Lord of the Rings’s Ruling Ring of passwordless login security: one solution to help you minimize all issues (or, at least, most of them).

7. Neglecting Security Misconfigurations

Passwordless login solutions are like the latest Tesla car: technologically advanced, powerful, and sporting a ton of awesome features. Yes, you can have the best authentication method and technology, but if it is incorrectly configured, it’ll be useless and put you and your whole organization in danger.

In fact, the 2021 OWASP top 10 ranks misconfigurations as the fifth most critical web application security risk. The following can lead to malware infection risks:

  • Application and software misconfigurations,
  • Using default configuration settings, and
  • Sticking to manufacturer authentication credentials.

3 Ways to Prevent These Login Security Errors

Did you know that some manufacturers publish how-to guides explaining how to find their products’ default usernames and passwords? So:

  • Change all applications and systems’ default usernames and passwords. Never, ever run with the defaults — doing so is setting yourself up for a headache.
  • Personalize your passwordless login settings. Error messages should be concise to avoid information leaking useful information or informing attacks of flaws that can be exploited.
  • Disable all unused/unnecessary features, components, and frameworks. It’ll restrict the attack surface.

8. Ignoring Updates and Vulnerabilities

In Q1 2024, 8,697 new common vulnerability exposures (CVEs) were discovered. Over 1,600 more than in Q1 2023. We get it. Testing and installing patches can be boring and time-consuming tasks that aren’t generating profit for your company. But it’s a necessary function that ensures the security and reliability of your software products and services.

Unpatched software and unaddressed vulnerabilities can have disastrous consequences, including:

And it doesn’t matter if those flaws are old and well known. A 2023 study revealed that 76% of vulnerabilities used today as entry points by attackers were discovered between 2010 and 2019.  

3 Tactics to Prevent This Passwordless Login Security Issue From Happening Again

To prevent this passwordless security mistake:

  • Promptly install all software updates. Patches and updates are only as good as the speed at which you apply them. As we saw with the WannaCry situation years ago, leaving your systems’ vulnerabilities unpatched puts your devices and data at risk of compromise.
  • Regularly test your systems. Proactively identify and fix vulnerabilities through continuous testing and a robust patch management strategy.
  • Proactively look for security issues. Check your systems for flaws using automated security check tools like SiteLock and HackerGuardian.
A screenshot of a SiteLock vulnerability scan
Image source: Sectigostore.com. The screenshot shows an example of SiteLock automated vulnerability scan.

Final Thoughts About 8 Passwordless Login Security Mistakes to Avoid

An error-free implementation of passwordless login solutions will enable your organization to mitigate the risks of using a conventional ID and password. They’ll also improve your applications’ user experience and help you save money in the long term by eliminating time-consuming and costly operations such as password resets.

We hope this article will help you avoid the most common passwordless login security mistakes so that you can fully enjoy the benefits of this technology. Implement it on your websites, applications, software, and devices.

Pro Tip

Get the ultimate protection and achieve a seamless user experience by implementing certificate-based passwordless logins.

About the author

Nadia is a technical writer with more than 15 years of experience in IT, software development projects, email and cybersecurity. She has worked for leaders in the IT industry and Fortune 500 companies. A Certified CSPO mail application security product owner and a former application security engineer, she also works as a professional translator. She is a big fan of Ubuntu, traveling and Japan.