Security researchers from Nepal recently discovered a new vulnerability in the login system of Meta's Facebook, Instagram and other applications, allowing anyone to bypass Facebook's two-factor authentication. "Anyone can exploit this vulnerability to bypass SMS-based two-factor authentication if they know the recipient's phone number," researcher Gtm Mänôz told TechCrunch. Mänôz said the vulnerability existed in Meta Group's unified login system, where Meta did not set an attempt limit when users entered the two-factor code used to log into their accounts. This means that all an attacker needs to know is the target's phone number or email address, and they can brute force the two-factor SMS code. Once the attacker obtains the correct verification code, the attacker can then launch subsequent attacks. It is understood that even after the attacker successfully attacks, Meta will remind the user that the account has been linked to someone else's account, so two-factor authentication is disabled. Mänôz reported the bug to the company last year, and Meta has now fixed the vulnerability. Meta eventually paid him $27,200 (currently about 184,000 RMB) for his discovery. |
>>: How to use ip command to manage network in Linux
It has been a long time since I shared informatio...
When 5G R16 and R17 have not yet been launched, c...
[[347439]] It should be pointed out that this is ...
Today, as the popularity of colocation data cente...
When interest in Hadoop began a few years ago, WA...
On January 20, the State Council Information Offi...
Network communication is one of the most basic fu...
According to people familiar with the matter, a c...
This month, CMIVPS is offering a limited special ...
Quick definition: A computer network hub is a lay...
Currently, there are only 13 root servers in the ...
The 5G era has arrived, and all walks of life are...
Recently, the net increase in 5G package users of...
1. Development Background If you want to be an ex...
"I'm stuck in a circle after watching ha...