Security researchers from Nepal recently discovered a new vulnerability in the login system of Meta's Facebook, Instagram and other applications, allowing anyone to bypass Facebook's two-factor authentication. "Anyone can exploit this vulnerability to bypass SMS-based two-factor authentication if they know the recipient's phone number," researcher Gtm Mänôz told TechCrunch. Mänôz said the vulnerability existed in Meta Group's unified login system, where Meta did not set an attempt limit when users entered the two-factor code used to log into their accounts. This means that all an attacker needs to know is the target's phone number or email address, and they can brute force the two-factor SMS code. Once the attacker obtains the correct verification code, the attacker can then launch subsequent attacks. It is understood that even after the attacker successfully attacks, Meta will remind the user that the account has been linked to someone else's account, so two-factor authentication is disabled. Mänôz reported the bug to the company last year, and Meta has now fixed the vulnerability. Meta eventually paid him $27,200 (currently about 184,000 RMB) for his discovery. |
>>: How to use ip command to manage network in Linux
Yecaoyun is a Chinese hosting company founded in ...
While cellular technology is often thought of as ...
[[192125]] The cyber espionage operation, now nam...
In order to create maximum availability and stabi...
The TCP three-way handshake is a classic intervie...
In recent years, with the accelerated advancement...
HTTP status code is the response status code retu...
In June 2019, my country officially issued 5G com...
During HUAWEI CONNECT 2017, Huawei and Microsoft ...
iWebFusion (iWFHosting) is a subsidiary of H4Y, a...
Justhost.ru recently launched its 22nd VPS node: ...
Many people always think that learning TCP/IP pro...
The network is the most stable part of the data c...
The International Seminar on Future Information a...
This year is the explosive growth period for 5G c...