Google Authenticator syncing feature exposes 2FA credentials

May 1, 2023

According to security experts Tommy Mysk and Talal Haj Bakry, a new synchronization function in Google’s Authenticator 2FA software, which allows users to connect into numerous services, has a severe security issue. Mysk found the weakness, which is that “secrets” or credentials exchanged between devices are not end-to-end encrypted, allowing attackers or Google to read the credentials.

Christiaan Brand, Google Group Product Manager, Identity and Security, defended the software, claiming that it shipped as planned. However, because there is no end-to-end encryption, Google can see what services each account owner uses, potentially allowing the company to target personalized ads. Users are also vulnerable to attackers as a result of the bug.

Mysk proposes avoiding this security risk by using the Google Authenticator offline without associating it to a Google account or by not utilizing the syncing option. However, both options eliminate much of the new update’s utility.

In response to the security concerns, Brand claimed that optional end-to-end encryption is currently available in several Google products and that there are plans to offer it in the future for Google Authenticator. Mysk urges users to use the program without the new syncing function until then.

The sources for this piece include an article in TechRepublic.

Top Stories

Related Articles

December 30, 2025 A fast-moving cyberattack has compromised more than 59,000 internet-facing Next.js servers in less than two days after more...

December 29, 2025 The U.S. National Institute of Standards and Technology (NIST) has warned that several of its Internet Time more...

December 29, 2025 A critical security flaw has been found in LangChain, one of the most widely used frameworks for more...

December 23, 2025 South Korea will require facial recognition scans to open new mobile phone accounts. The new rule is more...

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn