Symantec Access Management

Expand all | Collapse all

Guidance required on phishers getting DDNA and Device DNA  from js and exploiting it by replaying on legitimate websites

  • 1.  Guidance required on phishers getting DDNA and Device DNA  from js and exploiting it by replaying on legitimate websites

    Posted Aug 03, 2017 06:12 AM

    One of our customer using CA Risk Authentication has concerns around phishers getting DDNA, DevcieID and exploiting it by replaying it on legitimate websites. I am looking forward to mitigate these kind of issues. Any guidance or advise would be greatly appreciated?



  • 2.  Re: Guidance required on phishers getting DDNA and Device DNA  from js and exploiting it by replaying on legitimate websites

    Broadcom Employee
    Posted Sep 08, 2017 04:00 PM

    Hi, The DeviceID is taken from browser cookie and the DDNA is created by our OOTB js file. The MFP can be intercepted by anyone. Even if someone has the MFP as well as the DeviceID, there are still other rules that will always force the user to INCREASEDAUTH/ MFA. 

    For example, DEVICEVELOCITY and many other rules.