Source: The Hacker News
Author: info@thehackernews.com (The Hacker News)
URL: https://thehackernews.com/2025/10/how-attackers-bypass-synced-passkeys.html
ONE SENTENCE SUMMARY:
Synced passkeys pose significant security risks for enterprises, emphasizing the need for device-bound credentials and phishing-resistant authentication methods.
MAIN POINTS:
- Synced passkeys increase enterprise risk due to cloud account vulnerabilities.
- Adversary-in-the-middle attacks can circumvent strong authentication via downgrade tactics.
- Browser extensions can hijack WebAuthn requests, compromising passkey security.
- Device-bound passkeys provide higher security assurance than synced versions.
- Synced passkeys expand the attack surface through account takeovers or recovery abuses.
- Fallback authentication methods are susceptible to social engineering and should be eliminated.
- Continuous authentication is necessary to maintain security throughout a session.
- Enforce strict browser and extension policies to mitigate security threats.
- High-assurance authenticators should be the basis for enrollment and recovery processes.
- Architecture must include device-bound credentials and universal endpoint hygiene.
TAKEAWAYS:
- Prefer device-bound passkeys for enterprise environments over synced passkeys.
- Eliminate fallback methods like SMS and email for stronger security.
- Continuous authentication is essential for dynamic threat response.
- Enforce rigorous control over browser extensions to prevent vulnerabilities.
- High-assurance authentication is critical for secure enrollment and recovery.