Attacks against credentials
We broadly characterize these threats as those designed to steal or tamper with the credentials for users of DFS systems and mobile devices
Affected entities: Mobile User
Risk: Unauthorized access and takeover
Vulnerability: Use of weak passwords/PINs at the application level, making these credentials susceptible to brute-force attacks (SD: authentication)
Vulnerability: Use of simple PINs for accessing the mobile device (SD: authentication)
Risk: Credential-stealing through Man in the Middle attacks
vulnerability: Server misconfiguration (SD: authentication)
Risk: DFS system compromise
Vulnerability Failure to perform login monitoring, leaving systems susceptible to brute force attacks (SD: access control)
Last updated