[Cryptography] Keeping Malware from Using Security Hardware
Kent Borg
kentborg at borg.org
Sun Mar 2 14:29:24 EST 2025
[Forgive me if I am asking too applied a question, or if I am off topic
for a cryptography list.]
I have fretting about the threat of malware sneaking onto a machine and
doing things like keylogging*. And I am wondering ways of fighting back.
So what about two-factor gizmos such as Yubikeys, are they of any use here?
My specific question: What is to prevent malware from sniffing the user
typed information (probably username and password), and then using the
Yubikey itself to do its part of an evil authentication? Yubikey's touch
feature can help slow things down in the middle of the night, but once
the user wakes up getting him/er to touch seems like pretty easy social
engineering, or just waiting around until the user otherwise does a
legit touch and hijacking it seems possible, too.
Thanks,
-kb
* A recent WSJ article about a Disney employee who downloaded some
backdoored software from github and caused a major security incident for
Disney and subjected himself enormous headaches including being
fired…might have had something to do with my new fretting.
More information about the cryptography
mailing list