A security breach exposed two-factor authentication (2FA) codes/password reset links for millions of users on platforms like Facebook, Google, and TikTok.

Key Points:

  • YX International, an SMS routing company, left an internal database exposed online without a password.
  • The database contained one-time 2FA codes and password reset links for various tech giants.
  • YX International secured the database and claims to have “sealed the vulnerability.”
  • The company wouldn’t confirm how long the database was exposed or if anyone else accessed it.
  • Representatives from Meta, Google, and TikTok haven’t commented yet.

Concerns:

  • This leak highlights the vulnerabilities of SMS-based 2FA compared to app-based methods.
  • The lack of information regarding the leak’s duration and potential access by others raises concerns.

Gemini Recommendations:

  • Consider switching to app-based 2FA for increased security.
  • Be cautious of suspicious communications and avoid clicking unknown links.
  • Stay informed about potential security breaches affecting your online accounts.
  • @[email protected]
    link
    fedilink
    English
    44 months ago

    I’m not that tech savy, so I was under the impression sms 2FA was the best way to go - why is app based authentication better?

    • NekuSoul
      link
      fedilink
      English
      23
      edit-2
      4 months ago

      Someone already explained it, but here’s a ranking of the different methods which are commonly used in terms of security, from bad to good:

      • No 2FA
      • SMS/Phone-based TOTP (TOTP = the normally 6 digit code)
      • App-based TOTP
      • Hardware-token-based TOTP
      • Hardware-token (Fido2/WebAuthn/Passkeys)
      • @[email protected]
        link
        fedilink
        English
        14 months ago

        Thanks, what level would you recommend for an more or less average user? Would guess my most sensitive data are bank and google account.

        • brvslvrnst
          link
          fedilink
          English
          74 months ago

          Go app based, and keep it something that doesn’t sync (preferably) to external servers.

          I’m using andOTP currently for mine. You can create backups every now and again and store them off your phone for safe keeping too 🙂

    • [email protected]A
      link
      English
      134 months ago

      On top of all the other good answers, someone can also just SIM hijack your phone number by social engineering your phone provider into activating a new SIM card.
      And it’s usually much easier than one would think/hope.

        • [email protected]A
          link
          English
          24 months ago

          Make sure you backup your vault and/or keep the backup “paper codes” somewhere safe.
          Aegis, for example, can automatically backup an encrypted vault.

    • @[email protected]
      link
      fedilink
      English
      104 months ago

      Cause SMS is not encrypted, so your phone provider and any routing company like this one can read your texts, phone numbers can be spoofed (not sure about this one), or stolen via social engineering (someone calls your phone provider claiming it’s you and u lost your phone or something, then gets access to your number).

      There’s probably a lot more issues with it, i don’t remember them atm, but should be pretty easy to find with a search if you’re still curious.

      • @[email protected]
        link
        fedilink
        English
        34 months ago

        Also, physical phone stolen, and the thief just pops the simcard out and puts it in another phone.