Singapore banks ditching OTPs for online logins in 3 months

July 15, 2024
1 min read



TLDR:

  • Singapore banks are phasing out OTPs for online logins within 3 months to mitigate the risk of phishing attacks.
  • The move is to encourage customers to activate digital tokens for authentication instead of relying on OTPs.

Retail banking institutions in Singapore have three months to phase out the use of one-time passwords (OTPs) for authentication purposes when signing into online accounts to mitigate the risk of phishing attacks. The decision was announced by the Monetary Authority of Singapore (MAS) and The Association of Banks in Singapore (ABS) on July 9, 2024. Customers who have activated their digital token on their mobile device will have to use their digital tokens for bank account logins via the browser or the mobile banking app. The MAS is urging customers to activate their digital tokens to safeguard against attacks that are designed to steal credentials and hijack their accounts for conducting financial fraud. While OTPs were originally introduced as a form of second-factor authentication to bolster account security, cybercriminals have found ways to harvest such codes using various methods like OTP bots and phishing kits. Last week, SlashNext disclosed details of an “end-to-end” phishing toolkit dubbed FishXProxy that allows attackers to lower the technical bar for launching phishing campaigns at scale. Google has also unveiled a pilot program to prevent users from sideloading certain apps that abuse Android app permissions to read OTPs.


Latest from Blog

Top 20 Linux Admin Tools for 2024

TLDR: Top Linux Admin Tools in 2024 Key points: Linux admin tools streamline system configurations, performance monitoring, and security management. Popular Linux admin tools include Webmin, Puppet, Zabbix, Nagios, and Ansible. Summary

Bogus job tempts aerospace, energy workers

TLDR: A North Korean cyberespionage group is posing as job recruiters to target employees in aerospace and energy sectors. Mandiant reports that the group uses fake job descriptions stored in malicious archives