Binance Square
LIVE
LIVE
kaymyg
Alcista
--66 views
Traducir
#Babydogecoin now ranks 2nd on the [Binance Futures Next](https://www.binance.com/en/futures/next) voting leaderboard ousting #bittensor s $TAO

#Babydogecoin now ranks 2nd on the Binance Futures Next voting leaderboard ousting #bittensor s $TAO

Aviso legal: Contiene opiniones de terceros. No supone asesoramiento financiero. Consultar Términos y condiciones.
0
Creador relevante
LIVE
@kaymyg

Descubre más contenidos del creador

--
cont'd Update on the #hack theft and additional opsec lessons learned: I have now further confirmed the #2FA bypass attack vector was a man in the middle attack. I had received an email from Indeed job search platform informing me that they received a request to delete my account within 14 days. I was in bed at the time and was doing it from my phone via the mobile Gmail app. I hadn't used Indeed forever and don't care for it but obviously I thought it was unusual, as I didn't make such a request. Out of security precaution, I wanted to know who made such a request and wanted to check if Indeed had access logs, so I tapped it on my phone. Because I didn't use Indeed forever, I didn't remember my password so naturally I chose Sign in with Google. It took me to Indeed and I couldn't find a request log. Because I knew my old logins were already on the darkweb I figured someone must've got into my Indeed, and so I proceeded to enable 2FA. Honestly I didn't care much for Indeed even if it did get deleted, and thought it was just some small time hobby hacker messing around with an old login from some old exposed database leak. Turns out the Indeed email was a #spoofed phishing attack. The Indeed link I tapped in the Gmail app, was a scripted South Korean web link, which in turn routed me to some fake Indeed site, which captured my Sign in With Google, then routed me to the real Indeed site. They hijacked the session cookie enabling them to bypass 2FA, then accessed my Google account and abusing browser sync. Further general opsec lessons learned: 1. Mobile Gmail app will not show the sender's true email or link URLs by default, which is a big opsec flaw. Refrain from tapping mobile links in your mobile email client. 2. Refrain from using Sign In With Google or other #oAuth features. The convenience is not worth it due to ease of phishing attacks to bypass 2FA. Even if it may not be due clicking a phishing link, a regular website could be compromised at no fault of your own. The expectations of 2FA security let my guard down.
--

Últimas noticias

Ver más

Artículos en tendencia

Ver más
Mapa del sitio
Cookie Preferences
Términos y condiciones de la plataforma