July 27, 2016 By David Strom 2 min read

The idea is a good one: Use the cellphone camera to take a selfie and employ it as another login authentication credential.

Say Cheese

Both MasterCard and LogMeOnce have introduced a type of selfie authentication. The MasterCard process is very straightforward: If someone is buying a product from a participating merchant, the customer will get a push notification to the mobile device, which opens the selfie authentication app.

Users are then asked to blink (to show that they are living people and not just holding up a photo) and snap a picture. The app compares the photos taken to the one submitted by customers at the time of registration to verify their identity. The purchase is then approved and completed.

MasterCard announced its app last fall. Another vendor, LogMeOnce, recently added selfie authentication to its multifactor authentication service. LogMeOnce claims several hundred apps are already supported with the process. They rely on the end user verifying the photo on their mobile device — you can swipe right and left to see GPS and IP address details for further confirmation of your identity — and then use the photo as a master password to unlock your password vault.

Eliminating Authentication Weaknesses

Why are these tools important? There are weaknesses in all kinds of one-time passwords, including any selfie authentication. These weaknesses have been known and exploited for years: An attacker swaps the ever-changing part of the authentication process (the photo or the changing series of digits generated by a one-time password server) with something that appears to be dynamic but isn’t.

Security analyst Bruce Schneier addressed one such attack back in 2009. “We have to stop trying to authenticate the person; instead, we need to authenticate the transaction,” he wrote. “The current wave of attacks against financial systems are not exploiting vulnerabilities in the authentication system, so two-factor authentication doesn’t help.”

Indeed, there are still issues today. Wired published a scare story about not using SMS texts as the additional factor because of potential man-in-the-middle (MitM) attacks. The additional authentication factor “isn’t an invincibility spell. Especially if that second factor is delivered via text message,” Wired stated. “For services like Twitter that only offer second factor protections that depend on SMS, it’s time to wake up, smell the targeted attacks and give users better options.”

Wired cited the case of one well-known community organizer who had his Twitter account taken over. The attacker intercepted the one-time authentication codes by impersonating the victim and convincing the carrier to forward the text messages.

Is Selfie Authentication the Future?

Clearly, we need better authentication tools to manage the many passwords we amass as we use more and more online services. A number of vendors are working on other mechanisms besides selfies, such as PasswordlessApps’ Tidas project. This service uses the private encryption keys inside the more recent iPhones to sign and encrypt your data.

Its software development kit requires only a fingerprint and the TouchID button on the phone to login — no password required whatsoever. This is a great idea, since all private information is stored inside the iPhone and nothing is transmitted anywhere else.

This is only the first step in the path toward better authentication measures.

More from Identity & Access

Taking the complexity out of identity solutions for hybrid environments

4 min read - For the past two decades, businesses have been making significant investments to consolidate their identity and access management (IAM) platforms and directories to manage user identities in one place. However, the hybrid nature of the cloud has led many to realize that this ultimate goal is a fantasy. Instead, businesses must learn how to consistently and effectively manage user identities across multiple IAM platforms and directories. As cloud migration and digital transformation accelerate at a dizzying pace, enterprises are left…

“Authorized” to break in: Adversaries use valid credentials to compromise cloud environments

4 min read - Overprivileged plaintext credentials left on display in 33% of X-Force adversary simulations Adversaries are constantly seeking to improve their productivity margins, but new data from IBM X-Force suggests they aren’t exclusively leaning on sophistication to do so. Simple yet reliable tactics that offer ease of use and often direct access to privileged environments are still heavily relied upon. Today X-Force released the 2023 Cloud Threat Landscape Report, detailing common trends and top threats observed against cloud environments over the past…

Artificial intelligence threats in identity management

4 min read - The 2023 Identity Security Threat Landscape Report from CyberArk identified some valuable insights. 2,300 security professionals surveyed responded with some sobering figures: 68% are concerned about insider threats from employee layoffs and churn 99% expect some type of identity compromise driven by financial cutbacks, geopolitical factors, cloud applications and hybrid work environments 74% are concerned about confidential data loss through employees, ex-employees and third-party vendors. Additionally, many feel digital identity proliferation is on the rise and the attack surface is…

X-Force certified containment: Responding to AD CS attacks

6 min read - This post was made possible through the contributions of Joseph Spero and Thanassis Diogos. In June 2023, IBM Security X-Force responded to an incident where a client had received alerts from their security tooling regarding potential malicious activity originating from a system within their network targeting a domain controller. X-Force analysis revealed that an attacker gained access to the client network through a VPN connection using a third-party IT management account. The IT management account had multi-factor authentication (MFA) disabled…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today