A security breach exposed two-factor authentication (2FA) codes/password reset links for millions of users on platforms like Facebook, Google, and TikTok.

Key Points:

  • YX International, an SMS routing company, left an internal database exposed online without a password.
  • The database contained one-time 2FA codes and password reset links for various tech giants.
  • YX International secured the database and claims to have “sealed the vulnerability.”
  • The company wouldn’t confirm how long the database was exposed or if anyone else accessed it.
  • Representatives from Meta, Google, and TikTok haven’t commented yet.

Concerns:

  • This leak highlights the vulnerabilities of SMS-based 2FA compared to app-based methods.
  • The lack of information regarding the leak’s duration and potential access by others raises concerns.

Gemini Recommendations:

  • Consider switching to app-based 2FA for increased security.
  • Be cautious of suspicious communications and avoid clicking unknown links.
  • Stay informed about potential security breaches affecting your online accounts.
3 points

This is the best summary I could come up with:


The Asian technology and internet company YX International manufactures cellular networking equipment and provides SMS text message routing services.

Anurag Sen, a good-faith security researcher and expert in discovering sensitive but inadvertently exposed datasets leaking to the internet, found the database.

Two-factor authentication (2FA) offers greater protection against online account hijacks that rely on password theft by sending an additional code to a trusted device, such as someone’s phone.

Two-factor codes and password resets, like the ones found in the exposed database, typically expire after a few minutes or once they are used.

But codes sent over SMS text messages are not as secure as stronger forms of 2FA — an app-based code generator, for example — since SMS text messages are prone to interception or exposure, or in this case, leaking from a database onto the open web.

When asked by TechCrunch, the YX International representative said that the server did not store access logs, which would have determined if anyone other than Sen discovered the exposed database and its contents.


The original article contains 480 words, the summary contains 172 words. Saved 64%. I’m a bot and I’m open source!

permalink
report
reply
111 points

It’s a great recommendation to use app-based 2FA, except that lots of services seem to insist on and only offer SMS OTP.

For instance out of all the financial establishments I do business with, only one offers the option. The big name players don’t, it’s only some tiny little mom & pop CU that does.

It’s very much a business adoption issue.

permalink
report
reply
57 points

App-based is also unacceptable if it’s a proprietary implementation

TOTP/HOTP are the best standards right now

permalink
report
parent
reply
14 points

I like a combo of Yubikey and Bitwarden, personally.

permalink
report
parent
reply
18 points

Yeah, Yubikey fits - it implements TOTP/HOTP, and bitwarden is great

Just “app-based” worried me about apps rolling their own implementations instead of using standards

permalink
report
parent
reply
3 points

Have you ever used HOTP before? Convenience-wise, it’s much worse than TOTP. It’s not supported by popular apps, you can’t use it on several devices unless there’s synchronization, you never know if the code you’re looking at was used already.

permalink
report
parent
reply
3 points

Yeah, it’s much less convenient. I prefer TOTP, but I will pick HOTP over Cisco Duo’s proprietary implementation that I can’t use without their specific app if those are my only options

permalink
report
parent
reply
-40 points
*
Removed by mod
permalink
report
parent
reply
25 points
*

I don’t know how/if I could generally cite my sources, because I’m just anecdotally referring to the services that I happen to use, that offer 2FA, but restrict it to SMS or email delivery. It’s purely my experience that the most important services I use (banking, investment, utilities) are commonly the ones that don’t offer the ability to use an app for 2FA.

permalink
report
parent
reply
-40 points
Removed by mod
permalink
report
parent
reply
3 points
*

When you see “cite your sources” shit like this, please just block the user instead of arguing with them. So tired of these pricks. A person like this has no interest in seeing your sources, they just want to argue with anyone about anything.

permalink
report
parent
reply
1 point
Removed by mod
permalink
report
parent
reply
2 points

Not sure if you do business with them, but Charles Schwab does have a app-based MFA option - although that’s limited to Symantec’s own TOTP MFA.

permalink
report
parent
reply
3 points

A lot of sites say they only support one specific MFA app. But in my experience, any MFA app that can read the QR code will work.

permalink
report
parent
reply
1 point

Awesome.

permalink
report
reply
51 points

Aegis Authenticator, in case someone was wondering what to use

permalink
report
reply
2 points

I’m using ente auth also open source and decent.

permalink
report
parent
reply
10 points
*

I still use Authy, I know it’s frowned upon in the privacy community but it’s worked well enough for me so far. With them shutting down their desktop app though I see no reason not to switch to Aegis at some point in the near future. Just a pain in the backside setting it all up again as Authy doesn’t let you export your 2FA.

permalink
report
parent
reply
2 points

If you have a rooted phone, Aegis can import from several other apps, including Authy, automatically.

But don’t try to root your unrooted phone to unlock that capability. Rooting requires wiping the device, so you lose your data in the process.

permalink
report
parent
reply
1 point

But authy can backup your codes, so nothing will be lost

permalink
report
parent
reply
1 point
*
Deleted by creator
permalink
report
parent
reply
4 points

I’m not that tech savy, so I was under the impression sms 2FA was the best way to go - why is app based authentication better?

permalink
report
parent
reply
10 points

Cause SMS is not encrypted, so your phone provider and any routing company like this one can read your texts, phone numbers can be spoofed (not sure about this one), or stolen via social engineering (someone calls your phone provider claiming it’s you and u lost your phone or something, then gets access to your number).

There’s probably a lot more issues with it, i don’t remember them atm, but should be pretty easy to find with a search if you’re still curious.

permalink
report
parent
reply
3 points

Also, physical phone stolen, and the thief just pops the simcard out and puts it in another phone.

permalink
report
parent
reply
23 points
*

Someone already explained it, but here’s a ranking of the different methods which are commonly used in terms of security, from bad to good:

  • No 2FA
  • SMS/Phone-based TOTP (TOTP = the normally 6 digit code)
  • App-based TOTP
  • Hardware-token-based TOTP
  • Hardware-token (Fido2/WebAuthn/Passkeys)
permalink
report
parent
reply
1 point

Thanks, what level would you recommend for an more or less average user? Would guess my most sensitive data are bank and google account.

permalink
report
parent
reply
11 points

SMS-based can be intercepted, while app-based are calculated on your phone. If you’re using SMS -based, all someone needs to do is take over your phone, and they’re getting your 2FA codes. Here’s how easy that is: https://m.youtube.com/watch?v=lc7scxvKQOo

permalink
report
parent
reply
1 point

Here is an alternative Piped link(s):

https://m.piped.video/watch?v=lc7scxvKQOo

Piped is a privacy-respecting open-source alternative frontend to YouTube.

I’m open-source; check me out at GitHub.

permalink
report
parent
reply

On top of all the other good answers, someone can also just SIM hijack your phone number by social engineering your phone provider into activating a new SIM card.
And it’s usually much easier than one would think/hope.

permalink
report
parent
reply
3 points

I’m convinced, will switch to app authentication.

permalink
report
parent
reply
4 points

SMS 2fa has been recommended NOT to use since 2016.

permalink
report
parent
reply
1 point

That message did not arrived at general population.

permalink
report
parent
reply

For iOS, 2FAS, ente or Strongbox.

permalink
report
parent
reply
1 point

Is there a way to sync 2FAS between devices and browsers? I tried using it but couldn’t get things to sync. I often have instances where I don’t have access to my phone, so I need something browser based.

permalink
report
parent
reply
1 point

I’m partial to AndOTP myself.

permalink
report
parent
reply
4 points

Why tf Google is outsourcing security?

permalink
report
reply
16 points

Google is not a mobile phone network provider. SMS routing is not really their cup of tea. It is an industry with lots of established players, lota of local issues, and little to gain for Google. If it where up to Google, everyone would be using their app instead of SMS.

permalink
report
parent
reply
-20 points

I didn’t ask why they’ve outsourced SMS transmission. I’m aware that trying to do it yourself means going through lot of bureaucratic and regulatory stuff.

I asked why they’re outsourcing security.

permalink
report
parent
reply
16 points
*

Not only are you rude, but you are the one who isn’t understanding.

Nobody is “outsourcing security”. You have failed to comprehend the situation and instead of accepting your own ignorance you’ve turned around and been an ass to the person who tried to answer your question

Do better

permalink
report
parent
reply

Technology

!technology@lemmy.world

Create post

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


Community stats

  • 18K

    Monthly active users

  • 11K

    Posts

  • 505K

    Comments