{"id":24818,"date":"2024-07-04T05:10:09","date_gmt":"2024-07-04T13:10:09","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2024\/07\/04\/news-18548\/"},"modified":"2024-07-04T05:10:09","modified_gmt":"2024-07-04T13:10:09","slug":"news-18548","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2024\/07\/04\/news-18548\/","title":{"rendered":"Authy phone numbers accessed by cybercriminals, warns Twilio"},"content":{"rendered":"\n<p>Twilio has <a href=\"https:\/\/www.twilio.com\/en-us\/changelog\/Security_Alert_Authy_App_Android_iOS\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">warned users of the Authy<\/a> <a href=\"https:\/\/www.malwarebytes.com\/glossary\/multi-factor-authentication-mfa\">multi-factor authentication (MFA)<\/a> app about an incident in which cybercriminals may have obtained their phone numbers.<\/p>\n<p>Twilio said the cybercriminals abused an unsecured Application Programming Interface (API) endpoint to verify the phone numbers of millions of Authy multi-factor authentication users.<\/p>\n<p>Authy is an app that you install on your device which then produces a MFA code for you when logging into services.<\/p>\n<p>The cybercriminals were able test the validity of an enormous list of phone numbers against the unsecured API endpoint. If the number was valid, the endpoint would return information about the associated accounts registered with Authy.<\/p>\n<p>Twilio says it has seen no evidence of the attackers gaining access to Twilio\u2019s systems or other sensitive data, but as a precaution it is asking all Authy users to update to the latest <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.authy.authy&amp;hl=en_US&amp;pli=1\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Android<\/a> and <a href=\"https:\/\/apps.apple.com\/us\/app\/twilio-authy\/id494168017\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">iOS<\/a> apps.<\/p>\n<p>BleepingComputer <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-abused-api-to-verify-millions-of-authy-mfa-phone-numbers\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">notes<\/a> that a threat actor named ShinyHunters leaked a CSV text file containing what they claim are 33 million phone numbers registered with the Authy service.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cIn late June, a threat actor named ShinyHunters leaked a CSV text file containing what they claim are 33 million phone numbers registered with the Authy service.\u201d<\/p>\n<\/blockquote>\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"868\" height=\"401\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/07\/ShinyHunters.png\" alt=\"ShinyHunters post on a breach forum\" class=\"wp-image-113244\" \/><\/figure>\n<p>In that post, ShinyHunters suggests that buyers combine the data set with those leaked in the Gemini or Nexo data breaches. Nexo is a crypto platform where users can buy, exchange, and store Bitcoin and other cryptocurrencies. Gemini is another cryptocurrency exchange which has suffered several breaches in the past years.<\/p>\n<p>With matches between the data sets, a cybercriminal could engage in <a href=\"https:\/\/www.malwarebytes.com\/glossary\/simjacking\">SIM-swapping<\/a> or <a href=\"https:\/\/www.malwarebytes.com\/phishing\">phishing<\/a> attacks to steal the target\u2019s cryptocurrencies.<\/p>\n<p>If you are an Authy user we advise you to update at your earliest convenience and keep an eye out for any potential phishing messages.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-how-to-avoid-being-phished\">How to avoid being phished<\/h2>\n<p>Remember that phishing messages will try to rush you into making a decision by setting an ultimatum or otherwise imposing a sense of urgency. Don\u2019t let them rush you into an expensive mistake.<\/p>\n<p>There are a few tell-tale signs for phishing mails:<\/p>\n<ol start=\"1\">\n<li>It asks you to update\/fill in personal information.<\/li>\n<li>The URL on the email and the URL that displays when you hover over the link are different from one another.<\/li>\n<li>The \u201cFrom\u201d address is not the legitimate address, although it may be a close imitation.<\/li>\n<li>The formatting and design are different from what you usually receive from the impersonated brand.<\/li>\n<li>The email contains an attachment you weren\u2019t expecting.<\/li>\n<\/ol>\n<p>However, with the advancement of AI, phishing emails are getting more sophisticated. So if you have even a tiny amount of suspicion that something is phishy, don\u2019t hesitate to confirm the source of the email through another method. The chances of losing your money are much smaller after a quick call asking \u201cDid you send this?\u201d<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\" \/>\n<p><strong>We don&#8217;t just report on threats &#8211; we help safeguard your entire digital identit<\/strong>y<\/p>\n<p>Cybersecurity risks should never spread beyond a headline. Protect your\u2014and your family&#8217;s\u2014personal information by using <a href=\"https:\/\/www.malwarebytes.com\/identity-theft-protection\">identity protection<\/a>.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/07\/authy-phone-numbers-accessed-by-cybercriminals-warns-twilio\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Authy users have been warned that their phone numbers have been obtained by cybercriminals that abused an unsecured API endpoint. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[14183,32,31616,5897,25846,31617],"class_list":["post-24818","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-authy","tag-news","tag-phone-numbers","tag-privacy","tag-twilio","tag-unsecured-api"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24818","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=24818"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24818\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=24818"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=24818"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=24818"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}