A security breach exposed two-factor authentication (2FA) codes/password reset links for millions of users on platforms like Facebook, Google, and TikTok.

Key Points:

  • YX International, an SMS routing company, left an internal database exposed online without a password.
  • The database contained one-time 2FA codes and password reset links for various tech giants.
  • YX International secured the database and claims to have “sealed the vulnerability.”
  • The company wouldn’t confirm how long the database was exposed or if anyone else accessed it.
  • Representatives from Meta, Google, and TikTok haven’t commented yet.

Concerns:

  • This leak highlights the vulnerabilities of SMS-based 2FA compared to app-based methods.
  • The lack of information regarding the leak’s duration and potential access by others raises concerns.

Gemini Recommendations:

  • Consider switching to app-based 2FA for increased security.
  • Be cautious of suspicious communications and avoid clicking unknown links.
  • Stay informed about potential security breaches affecting your online accounts.
  • @[email protected]
    link
    fedilink
    English
    69 months ago

    A lot of services now accept physical security keys for logging in. These keys use FIDO similar to how a phone-based passkey works. You just plug the dude in and then you are good to go.

    Obviously not every company works with these just yet, but a lot of major companies do. Honestly most of the big tech companies support them.

    GitHub and Bitwarden are the two I’m immediately thinking of, but that’s likely because I just used my passkey for those lol.

    It’s way more secure than SMS MFA, and I prefer it to a phone app because I don’t have to look at then enter a code while hoping the time doesn’t run out for that code, forcing me to wait for a new one.

    • @[email protected]
      link
      fedilink
      English
      19 months ago

      I’ve got some older unopened v4 Yubikeys that work let me have when they upgraded to v5. I’ve been meaning to try them out. Problem is there’s no backup. If you lose or break the thing, you’re screwed if you didn’t have some alternative 2FA set up.

      • capital
        link
        English
        2
        edit-2
        9 months ago

        I programmed 3 of them for my Bitwarden login. One stays on my keys and the other two are in my desk at home and the fire safe. Could go as far as sticking one in a safe deposit box.

        Any time TOTP is an option, that goes into Bitwarden. Done.

        Now passkeys are becoming a thing and those will also go into Bitwarden, personally.