Hackers have found a way to overcome two-factor authentication

NGUYỄN ĐĂNG |

According to AFP, citing cybersecurity experts, hackers have developed a set of scams that can overcome two-factor authentication.

2-factor authentication has become a standard security feature in cybersecurity. This form requires users to verify their identity with a second authentication step, usually an OTP sent via text message, email or authentication application.

This additional layer of security is intended to protect users' accounts even if their passwords are stolen

The use of 2FA is recommended by cybersecurity experts to protect access to users' most sensitive accounts from emails, social media accounts, shopping applications, banks or e-wallets.

This solution, previously considered an invincible barrier to hackers, is being sabotaged by a scam tool called Astaroth. Cybersecurity experts at SlashNext were the first to discover the new tool, which is capable of overcoming two-factor authentication on Google, Microsoft and Yahoo accounts.

To overcome two-factor authentication, hackers send a scam link to users, pointing them to a fake login page that completely imitates the real interface of the target platform. When users enter their login information and secret code, this information will immediately be taken over by cybercriminals and their accounts will be stolen.

What makes Astaroth especially dangerous is its ability to block two-factor authentication in real time. According to SlashNext, the complete product set is sold on Dark Web (the hidden part of the Internet that is not indexed by regular search engines, where transactions often take place anonymously) for 2,000 USD.

To protect themselves from this type of attack, according to cybersecurity experts, as usual, users must be extremely vigilant and avoid clicking on suspicious links from unidentified senders.

Users should also use other, or even safer authentication methods, such as passkey (a security solution that does not require a traditional password), using fingerprints, facial recognition, or authentication codes stored on the device. This can be done with solutions from Apple, Google and Microsoft.

NGUYỄN ĐĂNG
TIN LIÊN QUAN

Images of iPhone 17 Pro Max revealed

|

After the iPhone 16e was announced, attention is now focusing on the upcoming iPhone 17 series.

MacBook Air M4 may be launched in March

|

New updates say Apple is likely to launch the MacBook Air M4 in March.

Updated gold price at the end of session 24.2: Reversing the 92 million VND mark

|

Updated gold price at the end of the session on February 24: Domestic gold increased, regaining the mark of VND92 million/tael.

Live football Nam Dinh 1-0 Binh Dinh: First half

|

Live match between Nam Dinh and Binh Dinh in round 14 of V.League 2024-2025, taking place at 6:00 p.m. today (February 24).

Hanoi announces 10th grade exam schedule for the 2025 - 2026 school year

|

Hanoi will organize the 10th grade entrance exam for high school in the 2025-2026 school year on June 7 and 8.

Mr. Nguyen Thanh Nghi holds new responsibility in Ho Chi Minh City

|

HCMC - Mr. Nguyen Thanh Nghi - Standing Deputy Secretary of the HCMC Party Committee - has just been assigned additional tasks by the Standing Committee of the HCMC Party Committee.

Phu Yen farmers are in trouble because thousands of hectares of crops are flooded

|

Prolonged heavy rain caused flooding in many areas in Phu Yen, causing thousands of hectares of people's crops to be submerged in water, causing severe damage.

People receive support of 1 million VND after the metro tunnel excavation incident

|

After the incident of the Nhon - Hanoi Railway Station metro tunnel excavation, households received support of 1 million VND/household.

Images of iPhone 17 Pro Max revealed

Anh Vũ |

After the iPhone 16e was announced, attention is now focusing on the upcoming iPhone 17 series.

MacBook Air M4 may be launched in March

QUANG MINH (theo engadget) |

New updates say Apple is likely to launch the MacBook Air M4 in March.

Cảnh báo về các hình thức tấn công giả mạo để vượt xác thực 2 yếu tố

NGUYỄN ĐĂNG |

Các chuyên gia an ninh mạng của Kaspersky đã phát hiện ra các hình thức tấn công giả mạo (phishing) được tội phạm mạng sử dụng để vượt xác thực 2 yếu tố (2FA) – vốn là một biện pháp bảo mật quan trọng được thiết kế để bảo vệ tài khoản trực tuyến.