Fun

Authy 2FA app leaked phone numbers that may be used for text phishing

News Feed - 2024-07-04 05:07:00

Christopher Roark3 hours agoAuthy 2FA app leaked phone numbers that may be used for text phishingTwilio, the developer of the Authy authenticator app, said user phone numbers were leaked to attackers but accounts themselves were not compromised.796 Total views11 Total sharesListen to article 0:00NewsOwn this piece of crypto historyCollect this article as NFTJoin us on social networksHackers gained access to the Authy Android app database and “were able to identify data associated with [accounts], including phone numbers,” according to a July 1 security alert post issued by the app’s developer, Twilio.


The accounts themselves “are not compromised,” the post stated, implying that the attackers were not able to gain authentication credentials. However, the exposed phone numbers may be used for “phishing and smishing attacks” in the future. Because of this risk, Twilio encouraged Authy users to “stay diligent and have heightened awareness around the texts they are receiving.”Twilio security alert regarding Authy data breach. Source: Twilio


Related:What is a phishing attack in crypto, and how to prevent it?


Centralized exchange users often rely on Authy for two-factor authentication (2FA). It generates a code on the user’s device, which the exchange may ask for before it performs withdrawals, transfers or other sensitive tasks. Exchanges Gemini and Crypto.com both use Authy as their default 2FA app, and Coinbase, Binance and many other exchanges allow it as an option.


Authy is sometimes compared to Google’s Authenticator app, which has a similar purpose and is a competitor.


The attacker gained access through an “unauthenticated endpoint,” according to the post. The team has secured this endpoint, and the app no longer accepts unauthenticated requests going forward. It encouraged users to upgrade to the latest version of the app, which contains security improvements.


Twilio claimed that users’ authenticator codes have not been compromised, so the attackers should not be able to access their exchange accounts. “We have seen no evidence that the threat actors obtained access to Twilio’s systems or other sensitive data,” the company stated.


According to a report from Seeking Alpha, the hack was performed by the ShinyHunters cybercriminal group, which “leaked a text file that purportedly shows the 33M phone numbers registered with Authy.” In 2021, cybersecurity blog Restoreprivacy reported that this same criminal group was responsible for an AT&T data breach that resulted in the data of 51 million customers being released online.


Authenticator apps were developed to prevent SIM swap attacks, a type of social engineering scheme that involves convincing a phone company to transfer a user’s phone number to the attacker. Once the attacker gains control of the user’s phone account, they use it to receive the user’s 2FA codes without needing to physically possess the user’s phone.


This type of attack is still prevalent today, as some users still receive 2FA codes through text messaging instead of through an app. On June 12, blockchain security firm SlowMist reported that millions of dollars were recently lost by OKX users due to SIM swap attacks.


Magazine: Crypto-Sec: Phishing scammer targets Hedera users, address poisoner gets $70K# Blockchain# Business# Hackers# Authentication# Cryptocurrency Exchange# Cybersecurity# HacksAdd reaction

News Feed

Supreme Court ruling ‘changes the game’ for US crypto firms
Andrew SingerJul 11, 2024Supreme Court ruling ‘changes the game’ for US crypto firmsThe high court’s decision further bolsters the argument “that Congress, not an agency, should decide if — and how — to regul
Bitcoin Price Skyrockets Above $71,000: Key Reasons Explained
Este artículo también está disponible en español. The Bitcoin price has surged past the $71,000 mark today. Over the past five days, Bitcoin’s price has rallied by
Electric Car Owner Says His Hacked Tesla Model 3 Mined up to $800 a Month Mining Ethereum
Electric Car Owner Says His Hacked Tesla Model 3 Mined up to $800 a Month Mining Ethereum According to the 2018 Tesla Model 3 owner, Siraj Raval, he mined up to $800 a month in cry
81.79 ‘Sleeping Bitcoin’ From 2011 Worth $3.6M Moved for the First Time in Over a Decade
81.79 "Sleeping Bitcoin" From 2011 Worth $3.6M Moved for the First Time in Over a Decade As bitcoin has increased more than 5% in value against the U.S. dollar during the last week
Bitcoin Under Siege: Bearish Pressure Keeps Price Below $99,575
Este artículo también está disponible en español. Bitcoinis under intense bearish pressure as it struggles to reclaim the $99,575 mark, a key resistance level that has pr
Dvision Network Announces Dvision World 2․0 Release In Beta Mode
Dvision Network Announces Dvision World 2․0 Release In Beta Mode press release PRESS RELEASE.As part of their ongoing development, Dvision Network has announcedthe launch of their
What crypto policies can voters expect from potential VPs under Kamala Harris?
Turner Wright6 hours agoWhat crypto policies can voters expect from potential VPs under Kamala Harris?Despite endorsements from major party leaders, the top and bottom of the Democratic presidential ticket have yet to be
Amber Group calls for transparency after ZKX shutdown
Amaka Nwaokocha1 hour agoAmber Group calls for transparency after ZKX shutdownThe ZKX team’s shutdown serves as a reminder of the critical role that transparency and accountability play in the success and stability of
Warner Bros. to Launch Hybrid Physical and Digital DC Comics-Themed NFT Trading Cards
Warner Bros. to Launch Hybrid Physical and Digital DC Comics-Themed NFT Trading Cards The multinational mass media and entertainment conglomerate Warner Bros. has announced the fir
Big Four Company KPMG to Examine New Business Models in the Metaverse
Big Four Company KPMG to Examine New Business Models in the Metaverse KPMG, one of the “big four” companies in the consulting and auditing business, is appointing a new
Ethereum Tests Previous Resistance As Support – Can Bulls Defend This Level?
Reason to trust Strict editorial policy that focuses on accuracy, relevance, and impartiality Created by industry experts and meticulously reviewed The highest standards in reporting and pu
AMD hardware accelerators to support blockchain interoperability
Savannah Fortis10 hours agoAMD hardware accelerators to support blockchain interoperabilityAMD partners with the Wormhole ecosystem to integrate enterprise-grade hardware accelerators into the Web3 space, facilitating bl