A security breach exposed two-factor authentication (2FA) codes/password reset links for millions of users on platforms like Facebook, Google, and TikTok.

Key Points:

  • YX International, an SMS routing company, left an internal database exposed online without a password.
  • The database contained one-time 2FA codes and password reset links for various tech giants.
  • YX International secured the database and claims to have “sealed the vulnerability.”
  • The company wouldn’t confirm how long the database was exposed or if anyone else accessed it.
  • Representatives from Meta, Google, and TikTok haven’t commented yet.

Concerns:

  • This leak highlights the vulnerabilities of SMS-based 2FA compared to app-based methods.
  • The lack of information regarding the leak’s duration and potential access by others raises concerns.

Gemini Recommendations:

  • Consider switching to app-based 2FA for increased security.
  • Be cautious of suspicious communications and avoid clicking unknown links.
  • Stay informed about potential security breaches affecting your online accounts.
  • Rednax@lemmy.world
    link
    fedilink
    English
    arrow-up
    15
    arrow-down
    1
    ·
    8 months ago

    Google is not a mobile phone network provider. SMS routing is not really their cup of tea. It is an industry with lots of established players, lota of local issues, and little to gain for Google. If it where up to Google, everyone would be using their app instead of SMS.

    • This is fine🔥🐶☕🔥@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      arrow-down
      22
      ·
      8 months ago

      I didn’t ask why they’ve outsourced SMS transmission. I’m aware that trying to do it yourself means going through lot of bureaucratic and regulatory stuff.

      I asked why they’re outsourcing security.

      • neatchee@lemmy.world
        link
        fedilink
        English
        arrow-up
        18
        arrow-down
        4
        ·
        edit-2
        8 months ago

        Not only are you rude, but you are the one who isn’t understanding.

        Nobody is “outsourcing security”. You have failed to comprehend the situation and instead of accepting your own ignorance you’ve turned around and been an ass to the person who tried to answer your question or

        Do better

        • This is fine🔥🐶☕🔥@lemmy.world
          link
          fedilink
          English
          arrow-up
          3
          arrow-down
          11
          ·
          8 months ago

          Does 2FA setup need SMS? Google could easily ignore SMS and still provide security via 2FA/MFA, either by secondary email or phone call.

          Also, these YX guys had their supposedly private database exposed to the internet. What kind of due diligence was done by Google before thay company was chosen as a vendor?

          • Passerby6497@lemmy.world
            link
            fedilink
            English
            arrow-up
            6
            ·
            8 months ago

            No, it doesn’t need sms for 2fa, that’s the entire point of google authenticator. But tons of users are technologically ignorant and just don’t grok how TOTP 2fa works. So Google included the least secure option for 2fa with the reasoning that something is better than nothing.

            As the initial responder pointed out Google is not an SMS company, so it’s not super surprising that they outsourced part of the routing process for conventional sms delivery.

            • This is fine🔥🐶☕🔥@lemmy.world
              link
              fedilink
              English
              arrow-up
              1
              arrow-down
              2
              ·
              edit-2
              8 months ago

              As the initial responder pointed out Google is not an SMS company, so it’s not super surprising that they outsourced part of the routing process for conventional sms delivery.

              Yes but that third party’s DB was accessible on the web. With SMS from mid-2023 in it.

              Even if Google wanted to use their services, they still could’ve insisted on setting up the database, having their engineers remote access to it.

              They just signed the contract, did bare minimum, and washed their hands off it instead of taking responsibility of their data.

              That’s what I meant by outsourcing security.

              Edit: The server should’ve been purging the old data after 14 or 30 days.