Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Passkey Login Bypassed via WebAuthn Process Manipulation

Passkey Login Bypassed via WebAuthn Process Manipulation

Posted on August 14, 2025August 14, 2025 By CWS

Researchers at enterprise browser safety agency SquareX have demonstrated an assault technique that can be utilized to achieve entry to an account protected by passkeys.

Passkeys are designed to supply a safer different to passwords, enabling customers to log into their account based mostly on a personal key saved on the gadget. Customers can check in utilizing varied authentication strategies, together with PIN, facial recognition, or fingerprint scan. 

Passkeys are more and more adopted and really helpful by main tech firms resembling Microsoft, Amazon, and Google.

Not like passwords, passkeys are thought of phishing resistant as a faux web site can not trick customers into handing over their passkey. 

Nonetheless, researchers at SquareX confirmed at DEF CON over the weekend that underneath sure circumstances passkeys will be bypassed. It’s value declaring that the assault doesn’t goal passkey cryptography, however relatively it reveals the potential for a compromised browser surroundings to govern the method that passkeys depend on.

The assault they described entails the attacker impersonating the focused person and bypassing passkey-based login safety, even in eventualities the place Face ID is used and the hacker doesn’t have entry to the precise gadget.

The assault targets WebAuthn, the usual that gives a method for customers to authenticate to web sites and purposes by way of passkeys. 

“When registering or authenticating on web sites utilizing passkeys, the web site communicates through the browser by calling the WebAuthn APIs. On this assault, the attacker forges each the registration and login flows by hijacking the WebAuthn API by way of JavaScript injection,” Shourya Pratap Singh, principal software program engineer at SquareX, informed SecurityWeek. Commercial. Scroll to proceed studying.

In an effort to conduct an assault, a risk actor must persuade the focused person to put in a malicious browser extension. The attacker can, as an example, disguise the malicious extension as a great tool and add it to an extension repository.  

Alternatively, a client-side vulnerability on the focused web site, resembling an XSS bug that permits JavaScript injection, will be exploited to hold out an assault.

The assault entails hijacking and manipulating the passkey registration and authentication processes. If the person has already registered on the focused web site, the attacker can reinitiate the passkey registration course of, or they’ll power the sufferer to downgrade to password-based authentication after which get hold of the credentials.

“For victims, it is sufficient to go to the web site the place they log in utilizing passkeys with the malicious extension put in, or just go to the web site instantly if it accommodates a client-side injection vulnerability (e.g., through XSS),” Singh defined. “No extra person interplay is required past regular registration and authentication.”

Associated: Browser Extensions Pose Severe Menace to Gen-AI Instruments Dealing with Delicate Knowledge

Associated: Passkey Information: FIDO Unveils New Specs, Amazon Pronounces 175 Million Customers

Associated: Google Now Syncing Passkeys Throughout Desktop, Android Gadgets

Security Week News Tags:Bypassed, Login, Manipulation, Passkey, Process, WebAuthn

Post navigation

Previous Post: Critical WordPress Plugin Vulnerability Exposes 70,000+ Sites to RCE Attacks
Next Post: Simple Steps for Attack Surface Reduction

Related Posts

CISA Warns of CWP Vulnerability Exploited in the Wild CISA Warns of CWP Vulnerability Exploited in the Wild Security Week News
CrowdStrike to Buy Identity Security Firm SGNL for 0 Million in Cash CrowdStrike to Buy Identity Security Firm SGNL for $740 Million in Cash Security Week News
Microsoft Paid Out  Million in Bug Bounties in Past Year Microsoft Paid Out $17 Million in Bug Bounties in Past Year Security Week News
Android Update Patches Critical Remote Code Execution Flaw Android Update Patches Critical Remote Code Execution Flaw Security Week News
Marks & Spencer Expects Ransomware Attack to Cost 0 Million Marks & Spencer Expects Ransomware Attack to Cost $400 Million Security Week News
Cloudflare Puts a Default Block on AI Web Scraping Cloudflare Puts a Default Block on AI Web Scraping Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News