Security News > 2021 > January > New Attack Could Let Hackers Clone Your Google Titan 2FA Security Keys

The vulnerability allows the bad actor to extract the encryption key or the ECDSA private key linked to a victim's account from a FIDO Universal 2nd Factor device like Google Titan Key or YubiKey, thus completely undermining the 2FA protections.
An actor will have first to steal the target's login and password of an account secured by the physical key, then stealthily gain access to Titan Security Key in question, not to mention acquire expensive equipment costing north of $12,000, and have enough expertise to build custom software to extract the key linked to the account.
To clone the U2F key, the researchers set about the task by tearing the device down using a hot air gun to remove the plastic casing and expose the two microcontrollers soldered in it - a secure enclave that's used to perform the cryptographic operations and a general-purpose chip that acts as a router between the USB/NFC interfaces and the authentication microcontroller.
Once this is achieved, the researchers say it's possible to glean the ECDSA encryption key via a side-channel attack by observing the electromagnetic radiations coming off the NXP chip during ECDSA signatures, the core cryptographic operation of the FIDO U2F protocol that's performed when a U2F key is registered for the first time to work with a new account.
Although the security of a hardware security key isn't diminished by the above attack due to the limitations involved, a potential exploitation in the wild is not inconceivable.
"Nevertheless, this work shows that the Google Titan Security Key would not avoid [an] unnoticed security breach by attackers willing to put enough effort into it," the researchers concluded.
News URL
Related news
- Google says hackers abuse Gemini AI to empower their attacks (source)
- New details reveal how hackers hijacked 35 Google Chrome extensions (source)
- Cross-Domain Attacks: A Growing Threat to Modern Security and How to Combat Them (source)
- Chinese hackers targeted sanctions office in Treasury attack (source)
- Hackers exploit critical Aviatrix Controller RCE flaw in attacks (source)
- Hackers use FastHTTP in new high-speed Microsoft 365 password attacks (source)
- Google Ads Users Targeted in Malvertising Scam Stealing Credentials and 2FA Codes (source)
- Patch Tuesday: January 2025 Security Update Patches Exploited Elevation of Privilege Attacks (source)
- Hackers use Google Search ads to steal Google Ads accounts (source)
- Balancing usability and security in the fight against identity-based attacks (source)