Attacks against credentials

We broadly characterize these threats as those designed to steal or tamper with the credentials for users of DFS systems and mobile devices

Affected entities: Mobile User

Risk: Unauthorized access and takeover

  • Vulnerability: Use of weak passwords/PINs at the application level, making these credentials susceptible to brute-force attacks (SD: authentication)

  • Vulnerability: Use of simple PINs for accessing the mobile device (SD: authentication)

Risk: Credential-stealing through Man in the Middle attacks

  • vulnerability: Server misconfiguration (SD: authentication)

Risk: DFS system compromise

  • Vulnerability Failure to perform login monitoring, leaving systems susceptible to brute force attacks (SD: access control)

Last updated