TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Anatomy of a hack

22 pointsby gr2020about 10 years ago

1 comment

rilitaabout 10 years ago
Summary of process:<p>1. Used mail.com, which was apparently vulnerable to some hack that allows resetting the password for accounts.<p>2. Hacker was able to setup call forwarding for the person&#x27;s phone, with only the email address to prove identity ( and perhaps information taken from emails )<p>3. Hacker was then able to reset gmail account even with two-factor auth, by having the two-factor number read out via voice via call forwarding.<p>Email is pretty much the problem here entirely. Using an insecure email host, and having access to your email be able to access thousands of dollars worth of bitcoins... is terrible.<p>Do you trust email hosts in general? I certainly don&#x27;t.
评论 #9166887 未加载