Breach Exposes Millions Of Mobile Numbers To Phishing Attacks
Cloud communications provider Twilio has published a statement that unidentified threat actors took advantage of an unauthenticated endpoint in Authy to identify data associated with Authy accounts, including users' mobile phone numbers.
Authy is a mobile app that generates multi-factor authentication codes at websites where you have MFA enabled.
While the accounts themselves were not compromised, the exposure of phone numbers poses a significant risk of phishing and smishing attacks. And now the company has said that it has taken steps to secure the endpoint and so will no longer accept unauthenticated requests.
The development comes days after an infamous threat actor known as ShinyHunters published a database comprising 33 million phone numbers allegedly pulled from Authy accounts on the Dark Web.
Authy, owned by Twilio since 2015, is a popular two-factor authentication (2FA) app that adds an additional layer of account security.
"We have seen no evidence that the threat actors obtained access to Twilio's systems or other sensitive data," it said in a July 1, 2024, security alert. But out of an abundance of caution, it's recommending that users upgrade their Android, version 25.1.0 or later, and iOS, version 26.1.0 or later, apps to the latest version. It also cautioned that the threat actors may attempt to use the phone number associated with Authy accounts for phishing and smishing attacks. "We encourage all Authy users to stay diligent and have heightened awareness around the texts they are receiving," it noted.
Limiting the damage caused by a data breach or leak is your first line of defence against scammers and fraudulent activity on your accounts. Here’s what you need to do:
- Contact your mobile service provider to let them know your number has been compromised and that someone has been illegally accessing your accounts.
- Switch the two-factor authentication on accounts using the compromised phone number. You can use either a safe phone number or an authenticator app.
- When you make these adjustments, change your security questions as well.
- Notify your friends, family and co-workers of any compromise so they don’t fall for any scams perpetrated in your name.
- Check your accounts for suspicious activity and watch out for social engineering attacks such as phishing via text messages or unsolicited phone calls.
Always report an incident to your local police if you have fallen victim to fraud or identity theft.
Twilio | Coin Journal | Bleeping Computer | Hacker News | Bit Defender | The Hacker News
Image: Unsplash
You Might Also Read:
Deepfakes Deployed In Mobile Banking Malware Attacks:
If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.
- Individual £5 per month or £50 per year. Sign Up
- Multi-User, Corporate & Library Accounts Available on Request
- Inquiries: Contact Cyber Security Intelligence
Cyber Security Intelligence: Captured Organised & Accessible