Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Passkey Login Bypassed via WebAuthn Process Manipulation

Posted on August 14, 2025August 14, 2025 By CWS

Researchers at enterprise browser safety agency SquareX have demonstrated an assault technique that can be utilized to achieve entry to an account protected by passkeys.

Passkeys are designed to supply a safer different to passwords, enabling customers to log into their account based mostly on a personal key saved on the gadget. Customers can check in utilizing varied authentication strategies, together with PIN, facial recognition, or fingerprint scan. 

Passkeys are more and more adopted and really helpful by main tech firms resembling Microsoft, Amazon, and Google.

Not like passwords, passkeys are thought of phishing resistant as a faux web site can not trick customers into handing over their passkey. 

Nonetheless, researchers at SquareX confirmed at DEF CON over the weekend that underneath sure circumstances passkeys will be bypassed. It’s value declaring that the assault doesn’t goal passkey cryptography, however relatively it reveals the potential for a compromised browser surroundings to govern the method that passkeys depend on.

The assault they described entails the attacker impersonating the focused person and bypassing passkey-based login safety, even in eventualities the place Face ID is used and the hacker doesn’t have entry to the precise gadget.

The assault targets WebAuthn, the usual that gives a method for customers to authenticate to web sites and purposes by way of passkeys. 

“When registering or authenticating on web sites utilizing passkeys, the web site communicates through the browser by calling the WebAuthn APIs. On this assault, the attacker forges each the registration and login flows by hijacking the WebAuthn API by way of JavaScript injection,” Shourya Pratap Singh, principal software program engineer at SquareX, informed SecurityWeek. Commercial. Scroll to proceed studying.

In an effort to conduct an assault, a risk actor must persuade the focused person to put in a malicious browser extension. The attacker can, as an example, disguise the malicious extension as a great tool and add it to an extension repository.  

Alternatively, a client-side vulnerability on the focused web site, resembling an XSS bug that permits JavaScript injection, will be exploited to hold out an assault.

The assault entails hijacking and manipulating the passkey registration and authentication processes. If the person has already registered on the focused web site, the attacker can reinitiate the passkey registration course of, or they’ll power the sufferer to downgrade to password-based authentication after which get hold of the credentials.

“For victims, it is sufficient to go to the web site the place they log in utilizing passkeys with the malicious extension put in, or just go to the web site instantly if it accommodates a client-side injection vulnerability (e.g., through XSS),” Singh defined. “No extra person interplay is required past regular registration and authentication.”

Associated: Browser Extensions Pose Severe Menace to Gen-AI Instruments Dealing with Delicate Knowledge

Associated: Passkey Information: FIDO Unveils New Specs, Amazon Pronounces 175 Million Customers

Associated: Google Now Syncing Passkeys Throughout Desktop, Android Gadgets

Security Week News Tags:Bypassed, Login, Manipulation, Passkey, Process, WebAuthn

Post navigation

Previous Post: Critical WordPress Plugin Vulnerability Exposes 70,000+ Sites to RCE Attacks
Next Post: Simple Steps for Attack Surface Reduction

Related Posts

Russian Hackers Bypass Gmail MFA with App Specific Password Ruse Security Week News
Microsoft Sinkholes Domains, Disrupts Notorious ‘Lumma Stealer’ Malware Operation Security Week News
Echo Raises $15M in Seed Funding for Vulnerability-Free Container Images Security Week News
Krispy Kreme Confirms Data Breach After Ransomware Attack Security Week News
Ransomware Groups, Chinese APTs Exploit Recent SAP NetWeaver Flaws Security Week News
SAP Zero-Day Targeted Since January, Many Sectors Impacted  Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Flaws in Software Used by Hundreds of Cities and Towns Exposed Sensitive Data
  • RingReaper Malware Attacking Linux Servers Evading EDR Solutions
  • Turning BIA Insights Into Resilient Recovery
  • Scaly Wolf Attacking Organizations to Uncover Organizations’ Secrets
  • Serial Hacker Jailed for Hacking and Defacing Organizations’ Websites

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Flaws in Software Used by Hundreds of Cities and Towns Exposed Sensitive Data
  • RingReaper Malware Attacking Linux Servers Evading EDR Solutions
  • Turning BIA Insights Into Resilient Recovery
  • Scaly Wolf Attacking Organizations to Uncover Organizations’ Secrets
  • Serial Hacker Jailed for Hacking and Defacing Organizations’ Websites

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News