For various reasons, some authentication measures in common use by fund groups may have become less effective over time. For example, the username/password combination commonly used to authenticate shareholders may not offer the same degree of protection against fraud as it has in the past. Usernames, in and of themselves, are of limited value in authenticating users, and, as algorithms have become more sophisticated and computers have become more powerful, fraudsters continue to make significant advancements in cracking passwords. Indeed, tools for cracking passwords are readily available to the public, and require relatively modest equipment and little, if any, expertise.1 A recent report found that passwords as long as 55 characters could be cracked with relative ease.2
The information underlying Knowledge-Based Authentication questions (e.g., a user’s mother’s maiden name or the name of a childhood pet) may also be lost or misappropriated in large-scale data breaches or may be obtained through hacking.6 Moreover, with respect to certain questions, a fraudster may, even in the absence of a data breach or a hacking incident, obtain sufficient information to compromise a user’s account. Indeed, the user himself or herself, perhaps with the assistance of family and friends, may voluntarily divulge much of this information. The ubiquity of social media tends to undermine the value of certain questions, such as the shareholder’s mother’s maiden name or the name of a childhood pet.7
Sources
- See Dan Goodin, Anatomy of a hack: How crackers ransack passwords like “qeadzcwrsfxv1331”, ArsTechnica.com (May 26, 2013), http://arstechnica.com/security/2013/05/how-crackers-make-minced-meat-out-of-your-passwords/ (describing how an editor of a technology website used a password cracking program to decipher nearly half of over 16,000 passwords in a few hours, while expert password cracker deciphered up to 90% of the same passwords in less than a day).
- See Somini Sengupta, Machines Made to Know You, by Touch, Voice, Even by Heart, Bits Blog, NEW YORK TIMES (Sept. 10, 2013), http://bits.blogs.nytimes.com/2013/09/10/beyond-passwords-new-tools-to-identify-humans/.
- See, e.g., Bob Covello, Why the password hackers never trigger an account lockout, GrahamCluley (Aug. 3, 2015), https://grahamcluley.com/2015/08/password-account-lockout/.
- See Neil J. Rubenking, Microsoft: Changing Passwords Isn’t Worth the Effort, PC MAGAZINE (Apr. 15, 2010), http://www.pcmag.com/article2/0,2817,2362692,00.asp.
- See Graham Cluley, 55% of net users use the same password for most, if not all, websites. When will they learn?, NakedSecurity.Sophos.com (April 23, 2013), https://nakedsecurity.sophos.com/2013/04/23/users-same-password-most-websites/ (citing a poll showing that over half of Internet users use the same password for most, if not all, websites).
- See David Lott, Is Knowledge-Based Authentication Still Effective?, Retail Payments Risk Forum, Federal Reserve Bank of Atlanta (Oct. 21, 2013), http://portalsandrails.frbatlanta.org/2013/10/is-knowledge-based-authentication-still-effective.html (describing an identity theft service that had hacked into some of the country’s largest aggregators of consumer and business information, and then sold the information online).
- See, e.g., Gasan Awad, Move Past Secrets to Real Identity Verification (Nov. 12, 2014), http://insight.equifax.com/move-past-secrets/ (“Now, with the proliferation of social networks, genealogy sites, blogs, and other ways for people to disclose more personal information about themselves in more different contexts, there are many fewer secrets than there used to be.”).