TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Twilio confirms data breach after hackers leak 33M Authy user phone numbers

663 pointsby mindracer11 months ago

52 comments

pembrook11 months ago
While this sucks, my phone is in so many data breaches at this point it doesn’t matter.<p>The spam-to-ham ratio on my phone number is now far worse than any other channel for me. The traditional phone network is at risk of going the way of the fax machine if we don’t do something about the spam problem like we did with email.<p>If I’m on a call, even with family, it’s now almost exclusively on FaceTime&#x2F;zoom&#x2F;meet&#x2F;etc. I can’t remember the last time I talked on the traditional phone network or received a legitimate call. Which isn’t great because those aforementioned platforms are all proprietary walled gardens with terrible incentives — once they capture the market fully they will eventually dump ads all over your calls. Don’t believe me? Just look at what Gmail did to monetize the lock-in on your inbox.
评论 #40876910 未加载
评论 #40882154 未加载
评论 #40876760 未加载
评论 #40878354 未加载
评论 #40878142 未加载
评论 #40880049 未加载
评论 #40878266 未加载
评论 #40877578 未加载
评论 #40884643 未加载
评论 #40878541 未加载
评论 #40880047 未加载
评论 #40883104 未加载
评论 #40878766 未加载
评论 #40878842 未加载
评论 #40878411 未加载
评论 #40876755 未加载
评论 #40886212 未加载
评论 #40881953 未加载
评论 #40880702 未加载
评论 #40877511 未加载
评论 #40878755 未加载
评论 #40876541 未加载
评论 #40879623 未加载
评论 #40883327 未加载
评论 #40878846 未加载
评论 #40877682 未加载
jordigh11 months ago
Took a while, but this commenter is finally correct:<p>&gt; Why does Authy require I provide my cell phone number and email address? Why do I have to have a user account? This is completely ridiculous. I do not need nor want cloud syncing or backup. You are making Authy a potential target for attacks by associating a user to cloud stored 2FA information.<p>&gt; This is not in the spirit of 2FA.<p><a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=9100560">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=9100560</a>
评论 #40881159 未加载
评论 #40879918 未加载
评论 #40881942 未加载
评论 #40884087 未加载
评论 #40882283 未加载
评论 #40879462 未加载
评论 #40879907 未加载
mihaaly11 months ago
And they wonder in random organizations and businesses that I am not willing to give all my personal details right away on first contact despite their &#x27;utmost importance&#x27; of handling my data very securely, all this just to be informed about their product. And they seems to be offended with a &quot;but we did it so for many years now&quot; on my refusal and saying goodbye if they try to insist this &quot;company policy&quot;.<p>Unluckily sooo many give zero or negative fáck among their potential and existing customers. This includes businesses providing medical services sending all the clien&#x27;t data and medical results in clear text email and even declaring for their own convenience that &quot;The property and copyright or other intellectual property rights in the contents of any document or images provided to you shall remain our property&quot;, for your ultrasound results. Your medical results are their property for those use their services. So they do as they plase with their data, not your data, not your concern if it is protected or not. And people go there and rate this service 4.8 on google, insane. Of course no-one really reads TOC, not even for sensitive medical services. People do not learn.
评论 #40880226 未加载
kylehotchkiss11 months ago
Twilio requires Authy for 2fa for sendgrid and maybe even twilio itself instead of supporting more standardized 2fa that’d allow 1pass to be used. This is all the more frustrating because I was forced to use Authy to protect an account instead of my regular tooling and they still managed to screw it up. Twilio, take a hint and stop forcing people to use your custom thing<p><pre><code> https:&#x2F;&#x2F;www.twilio.com&#x2F;docs&#x2F;sendgrid&#x2F;ui&#x2F;account-and-settings&#x2F;two-factor-authentication</code></pre>
评论 #40878089 未加载
评论 #40878521 未加载
评论 #40882289 未加载
评论 #40880394 未加载
darkr11 months ago
This doesn’t surprise me. I found an information exposure vuln on the user registration endpoint a while ago (given a phone number of an authy user who had previously registered via another customer, retrieve all other numbers&#x2F;devices&#x2F;timestamps, email addresses and other info for that user).<p>It took them two years to fix it.
评论 #40876818 未加载
snowwrestler11 months ago
I use Authy’s iOS app to generate 2FA tokens for a few accounts. I cannot remember ever entering my phone number into it, or establishing an Authy account of any kind. Is there some other way they would have acquired my phone number?<p>I’m trying see if the issue is some unanticipated issue with the iOS client app itself, or if it is only affecting people who created online accounts with Authy to sync their 2FA credentials across devices.
评论 #40876749 未加载
评论 #40875607 未加载
评论 #40876355 未加载
评论 #40875704 未加载
评论 #40876294 未加载
duckmysick11 months ago
&gt; Twilio has detected that threat actors were able to identify data associated with Authy accounts, including phone numbers, due to an unauthenticated endpoint. We have taken action to secure this endpoint and no longer allow unauthenticated requests<p>How do I avoid such problems in my own app? Force authentication for all requests with row-level security? Rate limiting?<p>Any testing frameworks that would catch this? Something like &quot;given endpoint &#x2F;user&#x2F;phone-number-validate make sure only &lt;user&gt; can access it&quot;.
评论 #40875906 未加载
评论 #40875910 未加载
评论 #40876419 未加载
评论 #40877528 未加载
评论 #40876690 未加载
评论 #40877049 未加载
m00x11 months ago
It&#x27;s sad how awful Twilio&#x27;s engineering has become. I used it super early on and it was amazing, and while they had hiccups, they were never major and they were growing pains.<p>Today they have incidents almost every week, and now data breaches.
评论 #40880383 未加载
localfirst11 months ago
There really has to be steep repercussions for companies that fail to protect user data like this. At this point I can&#x27;t help but feel that there is wilful neglect with the aim of exfiltrating data with unknowable aim.<p>Our digital data must be recognized as human rights but lately the world has been vocal about it but silent when it comes to action and enforcement.<p>More and more reason why people no longer trust cloud hosted solutions. Offline-first, local-first with optional data sync is the <i>only</i> path forward to combat violation of our rights to our own digital data.<p>Case in point, feeding haveibeenpwned with a bunch of HN user handles reveal a good chunk of you aren&#x27;t even aware your data has been leaked, especially ironic since I see comments from those handles are very anti-regulation when it comes to user data ownership.
评论 #40875830 未加载
denkmoon11 months ago
If you&#x27;ve got anything in Authy that isn&#x27;t using the authy custom authentication scheme (ie. just regular TOTP) now is the time to get it out.<p>Exporting the raw totp tokens can only be done from the desktop version that is currently deprecated and scheduled to be nuked from existence later this year. It requires getting the tokens loaded into the desktop app, then downgrading to an older version so you can use the chrome remote debugger to run a javascript function against the desktop app (embedded chromium) which pulls out the raw tokens and gives them to you.
评论 #40878662 未加载
jonathanlydall11 months ago
When I tried SendGrid it was super annoying that I had to install yet another Authenticator app on my phone. Now it’s become a point of data loss.<p>It’s bizarre to me that Twilio decided to get into the Authenticator business at all, especially while SendGrid had plenty enough problems to keep them busy.
评论 #40879631 未加载
vishnumohandas11 months ago
We built ente.io&#x2F;auth<p>If you need a cross platform authenticator, do check it out.<p>FOSS, optional e2ee backups.
评论 #40883831 未加载
评论 #40878669 未加载
jmbwell11 months ago
iOS&#x2F;iCloud has a built-in TOTP function also. Maybe better for friends and family than some people here.<p><a href="https:&#x2F;&#x2F;support.apple.com&#x2F;guide&#x2F;iphone&#x2F;automatically-fill-in-verification-codes-ipha6173c19f&#x2F;ios" rel="nofollow">https:&#x2F;&#x2F;support.apple.com&#x2F;guide&#x2F;iphone&#x2F;automatically-fill-in...</a>
评论 #40877507 未加载
评论 #40876291 未加载
29athrowaway11 months ago
&gt; due to an unauthenticated endpoint.<p>This is truly unacceptable for an authentication product.<p>An authentication product that doesn&#x27;t implement authentication correctly in their own APIs?
评论 #40876384 未加载
smaddox11 months ago
No wonder I&#x27;ve seen such a major spike in spam calls &#x2F; texts.
hypeatei11 months ago
I just migrated off of Authy last week but I was probably caught in this breach, ugh. Never liked it but they make it extremely difficult to export your data.<p>I used this project for exporting: <a href="https:&#x2F;&#x2F;github.com&#x2F;alexzorin&#x2F;authy">https:&#x2F;&#x2F;github.com&#x2F;alexzorin&#x2F;authy</a><p>EDIT: it appears this project was actually using the unauthenticated endpoint (used in breach, too) to facilitate exporting, lol. Good luck to anyone trying to get off of Authy, Twilio really doesn&#x27;t want you to export your data for &quot;security&quot; reasons.
评论 #40876524 未加载
评论 #40876393 未加载
评论 #40876696 未加载
评论 #40876669 未加载
godzillabrennus11 months ago
Authy is basically unsupported. Not surprised. I switched my accounts to 1Password when they announced the end of life of the macOS app.
评论 #40878674 未加载
评论 #40876938 未加载
评论 #40877982 未加载
ndneighbor11 months ago
I guess this explains the recent uptick in spam...
blackeyeblitzar11 months ago
Authy makes it hard to migrate away. Anyone know how to get the seed of the 2FA codes? Is there really no export option?
评论 #40875760 未加载
评论 #40875673 未加载
评论 #40877083 未加载
评论 #40875531 未加载
评论 #40877287 未加载
评论 #40875584 未加载
deegles11 months ago
I have removed all SMS based 2FA from every account that allows it and you should too.
评论 #40876600 未加载
评论 #40876560 未加载
tristor11 months ago
So fun story, I recently switched away from Authy for various reasons, but the key one was that I had to restore from a backup on a device and when I did so I realized the Authy had never actually deleted any of the 2FA&#x2F;TOTP accounts I&#x27;d configured over the years, things that had been deleted on device literally 5+ years ago were still stored and available on request via their API.<p>In general, after that I started poking, and discovered a lot of things I hadn&#x27;t bothered looking into before that make me extremely suspect of Authy&#x27;s general security.<p>For those looking for an alternative, I use 2FAS and Yubico Authenticator with a Yubikey now. Yubikey only allows you to store up to 32 TOTP slots, which is very limiting (I have more than 60 TOTP accounts for 2FA), so I use two apps and &quot;tier&quot; my 2FA.
xyst11 months ago
Terrible. Glad I moved away from Authy a long time ago. Small reminder that I need to delete the account though.
okokwhatever11 months ago
I still remember how hard was the process to be hired in this company. Maybe just a mask to hide the sad truth.
otterpro11 months ago
The main reason I didn&#x27;t use Authy was that it requested phone number when signing up, and it didn&#x27;t make any sense to me why they&#x27;d need it. Since then, I&#x27;ve been using 2FAS, since there&#x27;s no personal data that can be leaked.
instagib11 months ago
For iPhone, put the phone in do not disturb. It will send all calls to voicemail. If someone is on your emergency contacts, favorites, or 1by1 focus then a repeated call will actually ring your phone. Otherwise no notification. Not even a text counter increase unless the person taps (notify anyway).<p>Tried to do the same on an android phone and it didn’t work.<p>You can also port your phone to google voice or Fi and give away all your call information to them. Very few spam calls get through their filter.<p>I like the change phone area code to out of area and block all phone calls from that area that some call services provide.
评论 #40878551 未加载
zenkan11 months ago
One major problem I see with this hack is that the phone numbers exposed in the leak is the single factor of authentication needed to get access to an Authy account, including all the MFA tokens that the account has saved.<p>If there are any high-profile victims in this list SIM Swapping those phone numbers should be a very attractive approach.<p>I think security cautious companies should consider turning off multi-device support and start planning for a migration. This leak feels way riskier to me than what media reports it to be.
评论 #40880221 未加载
maerF0x011 months ago
It feels funny to say &quot;Hacker&quot; when it was just someone one using something on the open internet the way it was (defacto) designed for, and just used it a lot.<p>Like if I crawl hackernews and download all the somethings am I a &quot;hacker&quot;?<p>To me a hack is some kind of escalation of privilege beyond what I&#x27;m truly entitled to (such as stuffing passwords, tricking software to run a payload, crafting a payload for service A so that it tricks Service B) ...<p>Not using curl on a loop.
simcollect11 months ago
How come companies don&#x27;t care about encrypting their users&#x27; data in their databases?<p>It&#x27;s been possible for a very long time now.<p>Yet, companies keep leaking. And people keep sleeping.
评论 #40876556 未加载
otachack11 months ago
As alternatives: I use Authenticator Pro on my phone and keep encrypted backups whenever I modify it. I know others have pointed out Aegis.<p>The issue is starting the migration out of Authy. Assuming Authy has no easy export, I suggest you migrate over a few entries at a time (maybe from top down) while keeping account of transfers somehow. You can have authenticators live side by side in the meantime!
评论 #40875944 未加载
gz511 months ago
consider* putting endpoints on a private overlay network in which network access is cryptography-gated (e.g. x.509 cert based).<p>then, a misconfigured endpoint (or a zero day etc.) can&#x27;t be exploited by any_actor_on_the_internet - actors need to first complete the provisioning process you choose to enforce to be authorized to use the private overlay.<p>*not one size fits all, e.g. bad option if endpoints need to accept requests from unknowns.<p>however, many endpoints only need to accept requests from known (identified, authenticated, authorized) endpoints, and the added friction to id&#x2F;authN&#x2F;authZ get use the private overlay is not a business impediment.<p>there is a stigma here due to the horrors of NAC on private enterprise WANs. but NAC goals can be accomplished without that baggage via internet overlays and modern cryptography.<p>to be clear, i am by no means advocating to abandon traditional methods of endpoint auth - this it is just another layer which recognizes that single layers are rarely airtight (e.g. what just happened to Authy and Twilio).
评论 #40878161 未加载
bonestamp211 months ago
I recently setup a focus profile on my iPhone that only lets calls ring through from knowns contacts. There is going to be an adjustment period as I discover people and companies (such as doctors&#x2F;hospitals) that I want to allow calls from and add them to the whitelist. But otherwise, it has been really nice to cut down on all of the interruptions.
评论 #40884053 未加载
ZunarJ511 months ago
I have to thank this hacker for motivating me to move fully off this app again. Stopped being useful without the desktop app.
Featherknight11 months ago
Sucks that Twitch.tv still relies on it. My only service that uses it still, I’ve since migrated to other managers
xarope11 months ago
I have resisted moving off Authy as I liked the idea of cross-platform cloud sync. That&#x27;ll teach me. Any other suitable alternatives? Aegis is android only. I do run vaultwarden, but it means I need another 2FA to login to it, before I can use it as a 2FA for other sites.
评论 #40879716 未加载
评论 #40879979 未加载
评论 #40880173 未加载
评论 #40880229 未加载
MenhirMike11 months ago
Does anyone have a recommendation for an Open Source 2FA OTP app? That&#x27;s the only thing I use Authy for, to scan the QR Codes into the App and generate the 2FA tokens, but in a way that allows me to migrate to another phone without having to re-set all the 2FA tokens on the vendor side.
评论 #40875822 未加载
评论 #40875987 未加载
评论 #40875815 未加载
评论 #40875852 未加载
评论 #40876209 未加载
评论 #40875783 未加载
评论 #40875780 未加载
评论 #40875819 未加载
评论 #40880625 未加载
评论 #40875777 未加载
评论 #40877935 未加载
评论 #40875766 未加载
m4tthumphrey11 months ago
I only answer the phone now if I know the caller or if I’m expecting a call, and even then I would usually let it go to voicemail and call them back.
Fire-Dragon-DoL11 months ago
I had to use authy for damn twitch which couldn&#x27;t go for normal authenticator. Thank you -.-
infecto11 months ago
Good motivation to stop using Authy.
评论 #40875180 未加载
yakito11 months ago
We should have something similar to Apple&#x27;s hide my email for phone numbers
评论 #40884163 未加载
blackeyeblitzar11 months ago
What’s a better 2FA product that is E2E encrypted and lets me export the seeds?
delduca11 months ago
I never trusted them, I hated the fact of having to use SMS.
Dma54rhs11 months ago
How to confirm if my number was one of the leaked ones?
评论 #40875563 未加载
andrewstuart11 months ago
Can you imagine being the one to tell the CEO.
hi-v-rocknroll11 months ago
Auth0, Authy, Okta, and the like were and are the fail of delegating critical functions to third-parties.<p>For authentication, authorization, and 2FA, run it yourself on-prem or go home.
486sx3311 months ago
Damn 2FA with telephone numbers, I hate it!
khalifaaliumar10 months ago
09040246964
awahab9211 months ago
what do people use instead of twilio today? they make 2dcp verifications take too long
ilrwbwrkhv11 months ago
Jesus fucking Christ. Can these companies learn how to write software? Quality is dropping like dogs. Twilio used to be a good company and now they are utter shite. Such a shame. Leetcode and bad hiring practices have done this to our industry.
评论 #40876578 未加载
评论 #40877328 未加载
评论 #40879373 未加载
ehPReth11 months ago
is this just like<p>anotherservicetwilioruined.example.com&#x2F;api&#x2F;doesthispersonhaveanaccount?phone=+12012000000<p>and then the service says &#x27;yeah that number has an account&#x27; (and nothing else?)? then whomever repeats that for every possible phone number?<p>or... more than that?
exabrial11 months ago
That app is so dumb. Completely negated the usefulness of TOTP. Needs just to die already. Some executive over at Twilio signed the check for Authy acquisition and is still trying to justify the expense.
moffkalast11 months ago
&quot;Company who thought they&#x27;d lost all public trust loses last additional bit of trust they didn&#x27;t even know they still had, more at 11.&quot;
rvz11 months ago
My goodness, for the 100,000th time, just stop using phone numbers for 2FA. (I know you won&#x27;t anyway)<p>There are no more excuses other than asking for your phone to be sim-swapped and your bank accounts or your wallets to be drained by call centers.<p>If this breach doesn&#x27;t scare you from using phone number for 2FA, then maybe nothing ever will and AI and deep fakes will make this even worse.
评论 #40874648 未加载
评论 #40876181 未加载
评论 #40875470 未加载
评论 #40876363 未加载
评论 #40874692 未加载