New, by me: A technology company that routes millions of SMS text messages across the world has secured an exposed database that was spilling one-time security codes that may have granted users’ access to their Facebook, Google and TikTok accounts.

The SMS routing company's database was connected to the internet with no password.

More: https://techcrunch.com/2024/02/29/leaky-database-two-factor-codes/

A leaky database spilled 2FA codes for the world's tech giants | TechCrunch

An SMS routing company's exposed database was left online without a password, spilling 2FA codes and password reset links to the open web.

TechCrunch
@zackwhittaker @GossiTheDog so should we be rotating 2FA credentials on affected services?
@zackwhittaker Was this another episode of someone leaving an elasticsearch cluster in the default configuration?

@zackwhittaker so much "you had one job" it hurts.

And plenty of services use SMS codes as the only factor (which is already stupid, but this just brings it to the next level)

@zackwhittaker WHY DO SO MANY COMPANIES ONLY USE SMS FOR MFA???????

:sigh:

@zackwhittaker
Fortunately, those codes are only good for a few minutes at a time.

@zackwhittaker it's always appalling to me that banking apps/websites insist on using insecure SMS for 2FA.

I still really prefer TOTP to SMS, since getting past the former requires access to previously-generated secrets. The odds of an adversary getting access to your SMS 2FA coded seem much greater than them getting access to the files on one of your devices, cracking the encryption on your TOTP vault, and getting those secrets.

But I've heard security researches discourage TOTP. Still true?

@zackwhittaker To fix this issue, the company will pay for credit monitoring for 2 years for the people affected and then do fuck all to secure their systems because that costs money.
@zackwhittaker can you post the text here, this website is comprehensively bollocksed on mobile