Mobile security consultant Henry Hoggard uncovered a worrying failure in how PayPal had implemented its two-factor authentication (2FA) feature:
Recently I was in a hotel needing to make a payment, there was no phone signal so I could not receive my Two Factor Auth token. Luckily for me Paypal’s 2FA took less than five minutes to bypass.
Any suggestion that PayPal's 2FA security is flawed is definitely a serious concern, so how did he do it?
Well, if you don't have your mobile easily to hand to receive your 2FA code from PayPal they'll give you the option of answering your special security question instead.
However, Hoggard discovered that meddling with the post data sent by his browser to remove securityQuestion0 and securityQuestion1 would trick PayPal into believing he had verified his account access.
Hoggard told PayPal about the vulnerability at the start of this month, and the company has now fixed the flaw and rewarded the researcher with a bug bounty.
Of course, attackers would not have been able to exploit this flaw unless they already knew a user's password - but we know all too well that many users either choose weak passwords or reuse the same password on multiple sites. When built properly, two-factor authentication can make it harder for attackers to break into your account in these situations.
It's great when websites offer their users two-factor and two-step verification, but they also need to ensure that they have implemented the feature securely.