• Bitcoin
  • Ethereum
  • Blockchain
  • DeFi
  • Policies
  • Expert Interview
  • For Beginners
  • All Posts
Hot News

KiloEX Exchange Exploiter Returns $5.5 Million Days Following $7.5 Million Hack

04/18/2025

Crypto Rug Pulls Have Decreased in Frequency, Yet Their Impact Has Intensified: DappRadar

04/18/2025

Manta Founder Describes Attempted Zoom Hack by Lazarus Involving Authentic ‘Legit Faces’

04/18/2025
Facebook X (Twitter) Instagram
X (Twitter) Telegram
CoinomiCoinomi
  • Bitcoin
  • Ethereum
  • Blockchain
  • DeFi
  • Policies
  • Expert Interview
  • For Beginners
  • All Posts
CoinomiCoinomi
Home » Authy 2FA application exposed phone numbers that could be exploited for SMS phishing
Authy 2FA application exposed phone numbers that could be exploited for SMS phishing
Authy 2FA application exposed phone numbers that could be exploited for SMS phishing
Blockchain

Authy 2FA application exposed phone numbers that could be exploited for SMS phishing

07/03/20243 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email

Hackers managed to infiltrate the database of the Authy Android app, developed by Twilio, and were able to access data related to user accounts, including phone numbers, according to a security alert posted on July 1. However, the post clarified that the accounts themselves were not compromised, indicating that the attackers did not obtain authentication credentials. Nevertheless, the exposed phone numbers could potentially be used for phishing and smishing attacks in the future. In light of this risk, Twilio urged Authy users to remain vigilant and exercise caution when receiving text messages.

Authy is widely used by users of centralized exchanges for two-factor authentication (2FA), where it generates a code on the user’s device that the exchange requires before authorizing withdrawals, transfers, or other sensitive actions. Both Gemini and Crypto.com utilize Authy as their default 2FA app, while Coinbase, Binance, and numerous other exchanges offer it as an option. Authy is often compared to Google’s Authenticator app, which serves a similar purpose and is a competitor.

The attacker gained access through an unauthenticated endpoint, as stated in the post. The development team has since secured this endpoint, and the app no longer accepts unauthenticated requests. Users are encouraged to update to the latest version of the app, which includes enhanced security measures.

Twilio reassured users that their authenticator codes have not been compromised, meaning the attackers should not be able to access their exchange accounts. The company stated that there is no evidence to suggest that the threat actors gained access to Twilio’s systems or other sensitive data.

According to a report by Seeking Alpha, the ShinyHunters cybercriminal group was responsible for the hack and purportedly leaked a text file containing 33 million phone numbers registered with Authy. In 2021, the same criminal group was linked to an AT&T data breach that resulted in the release of data belonging to 51 million customers, as reported by cybersecurity blog Restoreprivacy.

Authenticator apps were designed to counter SIM swap attacks, a type of social engineering scam that involves convincing a phone company to transfer a user’s phone number to the attacker. Once the attacker gains control of the user’s phone account, they can receive the user’s 2FA codes without physically possessing their phone. These attacks are still prevalent today, particularly among users who receive 2FA codes via text messaging instead of using an app. On June 12, blockchain security firm SlowMist reported that millions of dollars had recently been lost by OKX users due to SIM swap attacks.

Magazine: Crypto-Sec: Hedera users targeted by phishing scammer, address poisoner obtains $70,000.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

KiloEX Exchange Exploiter Returns $5.5 Million Days Following $7.5 Million Hack

04/18/2025

The Collapse of Mantra OM Token Reveals Significant Liquidity Challenges in the Cryptocurrency Market

04/17/2025

Ethena Labs and Securitize Reveal Roadmap for the ‘Converge’ Network

04/17/2025

XRP: Reasons for Its Outperformance Compared to Altcoins and Future Outlook

04/17/2025
Add A Comment

Leave A Reply Cancel Reply

Top Posts

KiloEX Exchange Exploiter Returns $5.5 Million Days Following $7.5 Million Hack

04/18/2025

Crypto Rug Pulls Have Decreased in Frequency, Yet Their Impact Has Intensified: DappRadar

04/18/2025

Manta Founder Describes Attempted Zoom Hack by Lazarus Involving Authentic ‘Legit Faces’

04/18/2025

Coinomi - Where insights meet innovation. Discover the world of blockchain and cryptocurrency with a focus on insightful narratives and groundbreaking trends.

X (Twitter) Telegram
Hot Insights

KiloEX Exchange Exploiter Returns $5.5 Million Days Following $7.5 Million Hack

04/18/2025

Crypto Rug Pulls Have Decreased in Frequency, Yet Their Impact Has Intensified: DappRadar

04/18/2025

Manta Founder Describes Attempted Zoom Hack by Lazarus Involving Authentic ‘Legit Faces’

04/18/2025
X (Twitter) Telegram
  • Home
  • News
  • Bitcoin
  • Ethereum
  • Blockchain
  • DeFi
  • Policies
  • Expert Interview
  • For Beginners
Copyright © 2025 Coinomi. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.