Hackers Bypass Google’s Two-Factor Authentication By Taking Social Engineering To A New level
Hackers Bypass Google’s Two-Factor
Authentication By Taking Social Engineering To A New level
You may have read reports of Gmail accounts
being hacked despite the user having enabled the famed Google 2FA or two-factor
authentication. This is because hackers are employing a new strategy to lure
gullible users to hand over the 2FA code.
Some people can be tricked into disclosing
their two-factor authentication code to criminals, as there is a new sly trick
that makes them think that are in fact protecting their accounts while doing
so.
Two-factor authentication (referred 2FA) is
an important safety measure current mainstream of online services, from banks
to Google, Facebook, and government agencies who have gradually adopted the
security measures. In the two-factor authentication to protect the account
needs to log operation when you need to enter a verification code to send SMS
text messages, or even enter the correct password will be blocked by the
system.
The login is classified as a hacking
attempt, if the user doesn’t enter the code quickly, and the user is blocked
from accessing the account, even if they entered the correct password.
An unknown attacker had sent MACCAW an SMS
message posing to be from Google. The SMS read as follows:
“
(Google™ Notification) We recently noticed a suspicious sign-in attempt
to jschnei4@gmail.com from IP address 136.91.38.203 (Vacaville, CA). If you did
not sign-in from this location and would like to lock your account temporarily,
please reply to this alert with the 6-digit verification code you will receive
momentarily. If you did authorize this sign-in attempt, please ignore this
alert. ”
Comments
Post a Comment