National Cyber Warfare Foundation (NCWF) Forums


Hackers Abused Twilio API To Verify Phone Numbers used For MFA


0 user ratings
2024-07-05 03:11:29
milo
Red Team (CNA)

 - archive -- 

An unauthenticated endpoint vulnerability allowed threat actors to identify phone numbers associated with Authy accounts, which was identified, and the endpoint has been secured to prevent unauthorized access.  No evidence suggests the attackers gained access to internal systems or other sensitive data, but as a precaution, it’s crucial to implement additional security measures to mitigate […]


The post Hackers Abused Twilio API To Verify Phone Numbers used For MFA appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.



An unauthenticated endpoint vulnerability allowed threat actors to identify phone numbers associated with Authy accounts, which was identified, and the endpoint has been secured to prevent unauthorized access. 





No evidence suggests the attackers gained access to internal systems or other sensitive data, but as a precaution, it’s crucial to implement additional security measures to mitigate potential phishing attacks that could exploit the leaked phone numbers.





Join our webinar to learn about combating slow DDoS attacks, a major threat today.





An unauthenticated endpoint in Twilio’s Authy app allowed malicious actors to identify user phone numbers. While no evidence suggests a broader system intrusion or sensitive data exposure, 





They urge all Authy users to update their Android and iOS apps to address the vulnerability, which mitigates the risk of threat actors exploiting the exposed phone numbers for phishing and smishing attacks.  





Authy users should maintain vigilance and carefully examine any text messages that appear to be suspicious. 





A new software update is available for both Android and iOS devices, which addresses various bug fixes, including security vulnerabilities





It is imperative to install this update promptly to preserve the device’s functionality and integrity.  





For Android users, a link has been provided to download the update, while iOS users can acquire the update through the standard software update process on their devices. 





Twilio recognizes a security incident and apologizes for the disruption, as their Security Incident Response Team (T-SIRT) is currently investigating the issue and will provide updates as the situation evolves. 





This incident underscores the critical role of T-SIRT in proactively identifying security vulnerabilities, implementing preventative measures to mitigate risks, and taking corrective actions in the event of a breach. 





T-SIRT’s swift response and ongoing communication are essential to minimizing the impact of security incidents and maintaining customer trust.





If users are unable to access the Authy account due to login issues or lost access to the registered phone number, contacting Authy support is the recommended course of action. 





Their specialists will address the request and collaborate to restore functionality to the Authy account, which may involve troubleshooting login problems or initiating a phone number change procedure.





Are you from SOC/DFIR Teams? - Sign up for a free ANY.RUN account! to Analyse Advanced Malware Files


The post Hackers Abused Twilio API To Verify Phone Numbers used For MFA appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.



Source: gbHackers
Source Link: https://gbhackers.com/hackers-exploit-twilio-api-mfa/


Comments
new comment
Nobody has commented yet. Will you be the first?
 
Forum
Red Team (CNA)



Copyright 2012 through 2024 - National Cyber Warfare Foundation - All rights reserved worldwide.