#ninjalab

2024-09-08

#Ninjalab also has their own site about their #EUCLEAK research: ninjalab.io/eucleak/

2024-09-07

Side-channel #EUCLEAK attack discovered on devices using the Infineon cryptographic library, like the YubiKey 5 series (firmware <5.7) and Feitian A22 JavaCard.

But it does require a fair amount of factors to succeed: username, password, physical access, additional equipment, and for the cryptographic operations to involve modular inversions, like ECDSA.

There are two phases to the attack:

(1) The online phase requires opening the device to access the microcontroller, then using an electromagnetic probe, an oscilloscope, and a computer to capture the electromagnetic side-channel signals during operation.

(2) The offline phase (physical access no longer necessary) supposedly takes time varying from one hour to one day for each secret to uncover.

ninjalab.io/wp-content/uploads

#ninjalab #eucleak #sidechannel #attack #infineon #yubikey #feitian

2024-09-05

Des clés de sécurité #Yubico peuvent être clonées par canal auxiliaire - next.ink/148837/des-cles-de-se

> Les chercheurs français de #NinjaLab (Montpellier) ont découvert qu’il était possible de cloner des clés de sécurité #YubiKey 5 en utilisant un canal auxiliaire. La probabilité d’une attaque de grande ampleur est très faible, notamment car il faut posséder de nombreux éléments, du matériel spécifique et un accès à la machine visée.

Y'a des alternatives à ça ? J'en cherche.

#sécurité

Antonio J. Delgadoadelgado@eu.mastodon.green
2024-09-03

YubiKeys are vulnerable to cloning attacks thanks to newly discovered side channel
arstechnica.com/?p=2046777
#Yubikey #Yubikey5 #Security #SideChannel #Hacking #Hack #SecOps #ninjalab

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst