Security Analysis of Two-Factor Authentication Applications: Vulnerabilities in Data Storage and Management

Authors

  • Syafrial Fachri Pane Universitas Logistik dan Bisnis Internasional
  • Dzikri Izzatul Haq Universitas Logistik dan Bisnis Internasional
  • M. Amran Hakim Siregar Universitas Mitra Bangsa

DOI:

https://doi.org/10.12928/mf.v7i2.13312

Keywords:

Application Security, Security Analysis, Encryption, OTP bypass, Two-Factor Authentication

Abstract

In the digital era, two-factor authentication (2FA) is used as an additional security measure to protect user access to digital services. However, the storage methods of authentication data in 2FA applications have potential security vulnerabilities that can be exploited. This study analyzes five popular 2FA applications, namely Google Authenticator, 2FAS, Aegis Authenticator, Okta Verify, and TOTP Authenticator, focusing on how secret keys are stored and the potential exploitation risks. The experiment was conducted in a virtual Android environment using rooted BlueStacks 5. Data acquisition was performed using Media Manager and X-Plore File Manager, followed by data analysis with SQLite Browser and bypass with PyOTP. The results indicate that some applications store secret keys in plaintext or weak encryption, making authentication bypass possible by manually generating OTP codes. This study concludes that strengthening data storage security in 2FA applications is crucial to prevent unauthorized exploitation by malicious actors.

References

T. Mehra, “The Critical Role of Two-Factor Authentication (2FA) in Mitigating Ransomware and Securing Backup, Recovery, and Storage Systems,” Int. J. Sci. Res. Arch., vol. 14, no. 1, pp. 274–277, 2025. https://doi.org/10.30574/ijsra.2025.14.1.0019

F. P. E. Putra, A. Zulfikri, G. Arifin, R. M. Ilhamsyah, and others, “Analysis of phishing attack trends, impacts and prevention methods: literature study,” Brill. Res. Artif. Intell., vol. 4, no. 1, pp. 413–421, 2024. https://doi.org/10.47709/briliance.v4i1.4357

D. Patel, D. Trivedi, U. Raval, and A. Dennisan, “2F-Authsys: A hyperlocal two-factor authentication system using Near Sound Data Transfer,” J. Appl. Res. Technol., vol. 22, no. 2, pp. 197–205, 2024. https://doi.org/10.22201/icat.24486736e.2024.22.2.2244

M. R. Suresh, K. Balachander, S. L. Varman, and K. S. S. Faris, “Two Factor Authentication by Using Decentralized File Storage System,” 2024. https://doi.org/10.21203/rs.3.rs-4316141/v1

T. Taffese, F. Chavez, A. Fernandez-Reyes, and M. Byrne, “Redesigning and evaluating interfaces for two-factor authentication: performance of younger and older adults,” 2025, doi: 10.31234/osf.io/vtx7u_v1.

M. Az, S. F. Pane, and R. M. Awangga, “Cryptography: Perancangan Middleware Web Service Encryptor menggunakan Triple Key MD5. Base64, dan AES,” J. Tekno Insentif, vol. 15, no. 2, pp. 65–75, 2021. https://doi.org/10.36787/jti.v15i1.497

K. Liu et al., “A robust and effective two-factor authentication (2FA) protocol based on ECC for mobile computing,” Appl. Sci., vol. 13, no. 7, p. 4425, 2023.

https://doi.org/10.3390/app13074425

M. D. Tomić and O. M. Radojević, “Implementation of two-factor user authentication in computer systems,” Vojnoteh. Glas. Tech. Cour., vol. 72, no. 1, pp. 170–191, 2024.

https://doi.org/10.5937/vojtehg72-48081

C. Cornelius and T. Simon, “Investigate and Evaluate the Security Measures Commonly Used in Electronic Banking Transactions in Zambia and Possible Solutions,” Int. Res. J. Mod. Eng. Technol. Sci., vol. 5, pp. 9077–9082, 2023.

https://www.doi.org/10.56726/IRJMETS41115

B. D. Kurniawan, M. A. Rosid, I. A. Kautsar, and N. E. Pratama, “Rancang Bangun Library Web Token untuk Enkripsi HTTP Data Menggunakan Eksklusif-OR (XOR),” Phys. Sci. Life Sci. Eng., vol. 1, no. 1, p. 14, 2023. https://doi.org/10.47134/pslse.v1i1.164

B. Anwar, R. Kustini, and I. Zulkarnain, “Penerapan Algoritma RSA (Rivest Shamir Adelman) Untuk Mengamankan Nilai Siswa SMP HKBP P. Bulan,” J. Teknol. Sist. Inf. dan Sist. Komput. TGD, vol. 4, no. 1, pp. 88–91, 2021. https://doi.org/10.53513/jsk.v4i1.2623

Y. Sun, S. Zhu, Y. Zhao, and P. Sun, “Let Your Camera See for You: A Novel Two-Factor Authentication Method against Real-Time Phishing Attacks,” arXiv Prepr. arXiv2109.00132, 2021. https://doi.org/10.48550/arXiv.2109.00132

J. Haddad, N. Pitropakis, C. Chrysoulas, M. Lemoudden, and W. J. Buchanan, “Attacking Windows Hello for Business: Is It What We Were Promised?,” Cryptography, vol. 7, no. 1, p. 9, 2023. https://doi.org/10.3390/cryptography7010009

A. Aldahmani, B. Ouni, T. Lestable, and M. Debbah, “Cyber-Security of Embedded IoTs in Smart Homes: Challenges, Requirements, Countermeasures, and Trends. IEEE Open Journal of Vehicular Technology, 4, 281-292.” 2023. https://doi.org/10.1109/OJVT.2023.3234069

S. J. Murdoch and A. Abadi, “A Forward-secure Efficient Two-factor Authentication Protocol,” arXiv Prepr. arXiv2208.02877, 2022. https://doi.org/10.48550/arXiv.2208.02877

E. Ahmadieh and N. El Madhoun, “Comparative E-Voting Security Evaluation: Multi-Modal Authentication Approaches,” in 2024 6th International Conference on Blockchain Computing and Applications (BCCA), 2024, pp. 250–254.

https://doi.org/10.1109/BCCA62388.2024.10844450

A. Sofian et al., “Enhancing authentication security: analyzing time-based one-time password systems,” Int. J. Comput. Technol. Sci., vol. 1, no. 3, pp. 56–70, 2024, doi: 10.62951/ijcts.v1i3.25. https://doi.org/10.62951/ijcts.v1i3.25

R. O. Okeke and S. O. Orimadike, “Enhanced Cloud Computing Security Using Application-Based Multi-Factor Authentication (MFA) for Communication Systems,” Eur. J. Electr. Eng. Comput. Sci., vol. 8, no. 2, pp. 1–8, 2024. https://doi.org/10.24018/ejece.2024.8.2.593

J. Berrios, E. Mosher, S. Benzo, C. Grajeda, and I. Baggili, “Factorizing 2FA: Forensic analysis of two-factor authentication applications,” Forensic Sci. Int. Digit. Investig., vol. 45, p. 301569, 2023, doi: 10.1016/j.fsidi.2023.301569.

S. Pane and D. J. W. Ikram, “Deteksi Spam Bot Pada Komentar Youtube: Tinjauan Literatur Sistematis,” Comput. Sci. Res. Its Dev. J., vol. 15, no. 2, pp. 103–123, 2023. https://www.doi.org/10.22303/csrid.15.2.2022.103-123

Downloads

Published

2025-07-14

Issue

Section

Articles