blog / Nov 21, 2017 If Your Security Question List Looks like a Facebook Favorite List, Start Over Now by Lori MacVittie SHARE If you’ve been on Facebook any length of time, you’ve probably scrolled by one of those “let’s get to know each other!” status updates. These seemingly innocuous exhortations to share information make my teeth itch. It’s not because I’m not into sharing with friends, or divulging sometimes quite personal information. It’s because this data is increasingly part of the security equation that “protects” even more sensitive personal data. Yes, the scare quotes are necessary in this case. I present as exhibit A this screen capture of a fairly well-known cloud app which recently updated its security questions. It appears scarily like those lists you see on Facebook. Lists that are shared and re-shared no matter how many times you might offer a kind, cautioning word against them. My favorite color, by the way, is black. Or at least it will be until something darker comes along. While marginally better than asking for personal information that is just as easily discovered on the web —your mother’s maiden name, where you were born (my mother claims it was in a barn based on my habit of leaving doors open as a child), what high school you graduated from—the fact remains that these questions are useless for verifying identity. Seriously, how many colors are there? And how many of us share the same love of one of those limited choices? The answers to these questions aren’t that hard to guess in case a quick search doesn’t turn them up. Because, while we’re great at sharing, we aren’t so great at managing admittedly confusing privacy settings on social media, and some things are a matter of public record. Check an obituary sometime. You’ll quickly find not only my maiden name, but my mother’s maiden name and the names of all my siblings and their children and… See, it’s not that hard to find information if you know where to look. A new upcoming breach trends research report by F5 Labs, studies data breaches over the past decade and concludes that “There have been so many breaches that attacker databases are enrichened to the point where they can impersonate an individual and answer secret questions to get direct access to accounts without ever having to work through the impacted party.” It is also true that passwords are not enough. Credential stuffing1 is a real threat, and the upcoming F5 Labs breach trends report discovered that 33% of the breaches started with identity attacks, of which phishing was the primary root cause. Many of the malicious URLs clicked on, or malware files opened, in phishing attacks collect credentials, which are then sold and used to gain illicit access to corporate systems. Security questions are used as a secondary source of identity verification. They simulate, albeit poorly, the second-factor in a multi-factor authentication (MFA) strategy. But they do so with stunning inadequacy. MFA is based on the premise that identity is established based on one thing you know and one thing you have. The latter should not also be a thing you know, because in the sharing economy, we share everything—whether we should or not. MFA is a good idea. It’s not always convenient (we use it extensively at F5, so I say that as a user), but it is safer. And that’s the point. Because it’s really hard to duplicate a one-time password from an isolated key, but it’s pretty easy to figure out my pet’s name, thanks to Facebook, Twitter and others. So, if your implementation of MFA uses Facebook favorite lists (or any other “security questions”) as a second form of authentication, you need to rethink your strategy. 1 https://f5.com/about-us/blog/articles/credential-stuffing-what-is-it-and-why-you-should-worry-about-it-24784 SHARE MODIFIED: Dec 14, 2017 Tags: cyber security, mfa, security questions, threat intelligence stay up to date Get the latest application threat intelligence from F5 Labs. There was an error signing up. Thank you, your email address has been signed up. submit Follow us on social media. Related Stories article / Jul 22, 2016 Web Injection Threats: The Cost of Community Engagement on Your Site article / Oct 23, 2016 DARPA Proves Automated Systems Can Detect, Patch Software Flaws at Machine Speed blog / Aug 12, 2016 Is HEIST a Risk or a Threat?