TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Be warned, there's a nasty Google 2 factor auth attack going around

142 pointsby maccmanalmost 9 years ago

10 comments

ams6110almost 9 years ago
So the scam is, attacker knows your gmail address and your phone number. They send you the text message about suspicous activity on your account. Then they attempt to reset the password on your gmail account. That triggers Google to send you the code. You reply to the attacker's message with the code as instructed, and they own your account.
评论 #11841748 未加载
评论 #11842860 未加载
JohnTHalleralmost 9 years ago
This isn't a 2 factor attack. It's a social engineering Google account password reset attack. The attacking party is resetting your Google password and asking you to provide the code Google sends your registered mobile number via text to them.
评论 #11842371 未加载
评论 #11842365 未加载
azinman2almost 9 years ago
I wonder if this is at all related to a phishing attempt that just got my mom and all her friends. It came in as a &quot;docusign&quot; email that looked reasonably legit (to an ordinary person) that just had one button to sign and review a document. Apparently they asked for email, email password, and phone number. I was surprised to learn about the phone number bit and how they&#x27;d use it. Something like this is probably how.<p>While I&#x27;d have thought entering your email password would have been red flag galore, my mom and her friends were all exploited by the social trust aspect &quot;I figured if it was coming from you it would be real.&quot;
评论 #11843034 未加载
评论 #11841918 未加载
yborgalmost 9 years ago
Clever. If you&#x27;ve never actually had 2FA trigger before to know how it works, you could fall for this.
tjohnsalmost 9 years ago
This is one of nice things about using a hardware security key (FIDO U2F), like Yubikey.<p>Since the security key works with the browser to ensure its communicating directly with a specific site, you can&#x27;t MITM them like you can mobile app (TOTP) or SMS-based two-factor codes.<p>I wish more browsers would add support for them.
libeclipsealmost 9 years ago
This &quot;attack&quot; could be semi-mitigated by using Authy or Google Authenticator instead of SMS. If users knew to never ever paste the generated codes anywhere but the site, this attack wouldn&#x27;t exist at all.
tehwebguyalmost 9 years ago
A friend is currently receiving spear phishing attempts via text. Claims their lost iPhone has been found and that they need to log into icloud10 . com
koolbaalmost 9 years ago
While you&#x27;re add it, verify that your password has not been hacked by entering it here: hxxp:&#x2F;&#x2F;evil.example.com&#x2F;password-checker
评论 #11842477 未加载
评论 #11842762 未加载
fragsworthalmost 9 years ago
How can this possibly work?<p>Even if an attacker gets the phone code, they should still need your password to sign in. How do they get past that?
评论 #11841833 未加载
jschwartzialmost 9 years ago
I guess I&#x27;m going to go set all my security question answers to random 64-byte strings that are base-64 encoded.
评论 #11842129 未加载