A security breach exposed two-factor authentication (2FA) codes/password reset links for millions of users on platforms like Facebook, Google, and TikTok.

Key Points:

  • YX International, an SMS routing company, left an internal database exposed online without a password.
  • The database contained one-time 2FA codes and password reset links for various tech giants.
  • YX International secured the database and claims to have “sealed the vulnerability.”
  • The company wouldn’t confirm how long the database was exposed or if anyone else accessed it.
  • Representatives from Meta, Google, and TikTok haven’t commented yet.

Concerns:

  • This leak highlights the vulnerabilities of SMS-based 2FA compared to app-based methods.
  • The lack of information regarding the leak’s duration and potential access by others raises concerns.

Gemini Recommendations:

  • Consider switching to app-based 2FA for increased security.
  • Be cautious of suspicious communications and avoid clicking unknown links.
  • Stay informed about potential security breaches affecting your online accounts.
  • @neatchee
    link
    English
    16
    edit-2
    9 months ago

    Not only are you rude, but you are the one who isn’t understanding.

    Nobody is “outsourcing security”. You have failed to comprehend the situation and instead of accepting your own ignorance you’ve turned around and been an ass to the person who tried to answer your question

    Do better

    • This is fine🔥🐶☕🔥
      link
      English
      -99 months ago

      Does 2FA setup need SMS? Google could easily ignore SMS and still provide security via 2FA/MFA, either by secondary email or phone call.

      Also, these YX guys had their supposedly private database exposed to the internet. What kind of due diligence was done by Google before thay company was chosen as a vendor?

      • @Passerby6497
        link
        English
        89 months ago

        No, it doesn’t need sms for 2fa, that’s the entire point of google authenticator. But tons of users are technologically ignorant and just don’t grok how TOTP 2fa works. So Google included the least secure option for 2fa with the reasoning that something is better than nothing.

        As the initial responder pointed out Google is not an SMS company, so it’s not super surprising that they outsourced part of the routing process for conventional sms delivery.

        • This is fine🔥🐶☕🔥
          link
          English
          -2
          edit-2
          9 months ago

          As the initial responder pointed out Google is not an SMS company, so it’s not super surprising that they outsourced part of the routing process for conventional sms delivery.

          Yes but that third party’s DB was accessible on the web. With SMS from mid-2023 in it.

          Even if Google wanted to use their services, they still could’ve insisted on setting up the database, having their engineers remote access to it.

          They just signed the contract, did bare minimum, and washed their hands off it instead of taking responsibility of their data.

          That’s what I meant by outsourcing security.

          Edit: The server should’ve been purging the old data after 14 or 30 days.