{"id":17671,"date":"2018-04-23T08:00:03","date_gmt":"2018-04-23T12:00:03","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=17671"},"modified":"2022-04-27T15:52:18","modified_gmt":"2022-04-27T19:52:18","slug":"uh-oh-hackers-can-barrel-through-two-factor-authentication","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/uh-oh-hackers-can-barrel-through-two-factor-authentication\/","title":{"rendered":"Uh Oh, Hackers Can Barrel Through Two-Factor Authentication"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">You\u2019ve probably been pushed to use two-factor authentication on your smartphone in order to add a more than basic security. However, security experts have now discovered that hackers can just as easily steal your device\u2019s information by spoofing your SIM card. In fact, two-factor authentication is more vulnerable than using cybersecurity apps for mobile devices. One such highly rated app is <a href=\"https:\/\/app.appsflyer.com\/com.psafe.msuite?pid=Blog&amp;c=Hackers_Can Barrel_Through_Two_Factor_Authentication\" target=\"_blank\" rel=\"noopener\">dfndr security<\/a>, <\/span><span style=\"font-weight: 400;\">which has an anti-hacking feature<\/span><span style=\"font-weight: 400;\"> that protects you from phishing attempts that could be used to take over your device.<\/span><\/p>\n<p><b>Read More: <\/b><a href=\"https:\/\/www.psafe.com\/en\/blog\/avoid-being-hacked-when-shopping-online\/\"><b>Avoid Being Hacked When Shopping Online<\/b><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Here\u2019s what you should know about the latest threat that spoofs SIM cards and how you can protect yourself.<\/span><\/p>\n<p><b>How Hackers Intercept Unencrypted Messages<br \/>\n<\/b><span style=\"font-weight: 400;\">The way cyber criminals go about stealing your information is <\/span><a href=\"https:\/\/www.ft.com\/content\/b7be1c96-1b04-11e8-aaca-4574d7dabfb6\"><span style=\"font-weight: 400;\">by intercepting SMS messages<\/span><\/a><span style=\"font-weight: 400;\"> sent through your device as it\u2019s sent over the network. They can also steal databases full of data about mobile device accounts from phone carriers. One way they do this is by sending phishing emails, followed by exploiting a vulnerability in the signaling network that connects calls and messages.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">One such scam was used through a T-Mobile bug on the company website that gave hackers access to the personal details of customer accounts. Hackers then used this information to impersonate T-Mobile customers in order to get a copy of their SIM cards. The scam involved pretending to lose a phone and then calling customer service and requesting an identical SIM card. They are then able to drain your bank account if it is linked to your phone or access other personal details.<\/span><\/p>\n<p><b>Two-Factor Authentication? May Not Be So Secure<br \/>\n<\/b><span style=\"font-weight: 400;\">Experts now believe SMS is not as secure as using physical tokens or authentication apps on smart devices. One alternative to two-factor authentication that some companies are offering is a hardware token, as it does not send information over a carrier\u2019s network.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The benefit of using this technology or a security app with authentication features is that they do not depend on the SIM card. Plus, these apps are not randomly generated since they are based on a seed code connected to your identity, making it harder for hackers to access.<\/span><\/p>\n<p><b>Cryptocurrency Owners Being Targeted Too<br \/>\n<\/b><span style=\"font-weight: 400;\">Hackers often target wealthy groups or individuals flush with bitcoin and other cryptocurrencies in order to drain their accounts. Security groups have discovered that it\u2019s very easy for hackers to intercept text messages and steal bitcoin from unsuspecting digital wallet holders. For example, Coinbase accounts linked with specific Gmail accounts that were secured by two-factor authentication fell to hackers hands. \u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The white hackers then experimented by intercepting text messages and exploiting flaws in the cell network, giving them the ability to reset passwords to Gmail accounts and take over their Coinbase information.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In addition to using security apps and hardware tokens, you can avoid falling prey to these attacks by setting up a special PIN number with your mobile phone carrier that\u2019s required every time you call customer service. With that extra security measure in place, this can deter spoofing of your SIM card. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Finally, be careful when using two-factor authentication. It\u2019s always wiser to use it, rather than not, but perhaps disable it for any web based email that\u2019s connected to your cryptocurrency account.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The tried and true security method may not be as reliable as it used to be.<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[210,259,358,249,67],"class_list":["post-17671","post","type-post","status-publish","format-standard","hentry","category-security","tag-apps","tag-hackers","tag-protection","tag-security","tag-smartphone"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/17671","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=17671"}],"version-history":[{"count":3,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/17671\/revisions"}],"predecessor-version":[{"id":17886,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/17671\/revisions\/17886"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=17671"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=17671"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=17671"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}