Researchers reveal passkeys may not be as safe as we think they are - here's how to stay safe

Passkeys on mobile illustration
(Image credit: Shutterstock/ ArtemisDiana)

  • Browsers are the weak link that attackers now exploit for control
  • SquareX shows how trivial scripts can intercept and hijack passkey flows
  • From a user’s perspective, fake passkey prompts look entirely genuine

For years, the shift away from passwords toward passkeys has been framed as the future of secure authentication.

By relying on cryptographic key pairs instead of weak or reused strings, passkeys promised to remove the risks that have long plagued password systems.

However at the recent DEF CON 33 event, SquareX researchers presented new findings which challenge this view, claiming the very browsers relied upon to manage passkey workflows can be exploited in ways that bypass their protections.

The mechanics of passkeys

Passkeys operate through a system where a private key remains on a user’s device while a public key is stored by the service provider.

To log in, the user verifies identity locally with biometrics, a PIN, or a hardware token, and the server authenticates the response against its stored public key.

This structure should eliminate many of the classic risks, such as phishing or brute force attacks, yet the entire process assumes the browser serves as a trustworthy mediator, a role that SquareX researchers now argue is dangerously fragile.

They showed how attackers can manipulate the browser environment with malicious extensions or scripts, allowing them to intercept the registration flow, substitute keys, and even trick users into re-registering under attacker-controlled conditions.

From the victim’s perspective, the login process looks indistinguishable from a legitimate passkey operation, with no warning signs that credentials are being compromised.

Established enterprise security tools, whether endpoint protection or network defenses, do not provide visibility into this level of browser activity.

“Passkeys are a highly trusted form of authentication, so when users see a biometric prompt, they take that as a signal for security,” said SquareX researcher Shourya Pratap Singh.

“What they don’t know is that attackers can easily fake passkey registrations and authentication by intercepting the passkey workflow in the browser. This puts pretty much every enterprise and consumer application, including critical banking and data storage apps, at risk.”

With the majority of enterprise data now stored in SaaS platforms, passkeys are being rapidly adopted as the default authentication method.

SquareX’s findings suggest this transition introduces a new dependency on browser security, an area where oversight has traditionally been weak.

Passkeys may still represent progress beyond traditional credentials, yet the SquareX researcg shows no system is completely free from flaws, and organizations may have moved too quickly to embrace passkeys as a universal solution.

How to stay safe

  • Use a trusted antivirus to detect and block hidden malicious code.
  • Install extensions only from verified sources and review their permissions regularly.
  • Keep browsers updated to ensure the latest security fixes are applied.
  • Employ a password manager to securely handle legacy accounts that still rely on passwords.
  • Pair sign-in processes with an authenticator app to strengthen verification steps.
  • Regularly audit browser settings to minimize exposure to untrusted scripts or add-ons.
  • Limit the number of devices used for sensitive logins to reduce attack opportunities.

You might also like

Efosa Udinmwen
Freelance Journalist

Efosa has been writing about technology for over 7 years, initially driven by curiosity but now fueled by a strong passion for the field. He holds both a Master's and a PhD in sciences, which provided him with a solid foundation in analytical thinking. Efosa developed a keen interest in technology policy, specifically exploring the intersection of privacy, security, and politics. His research delves into how technological advancements influence regulatory frameworks and societal norms, particularly concerning data protection and cybersecurity. Upon joining TechRadar Pro, in addition to privacy and technology policy, he is also focused on B2B security products. Efosa can be contacted at this email: udinmwenefosa@gmail.com

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.