Peter Makohon’s Post

View profile for Peter Makohon, graphic

Global Head of Cyber Threat Management at AIG

Twilio's Authy, a popular multi-factor authentication (MFA) app, has fallen victim to a significant security breach. Hackers exploited an unsecured API endpoint to verify and compile a list of 33 million phone numbers associated with Authy accounts[1]. The breach was revealed when a threat actor named ShinyHunters leaked a CSV file containing 33,420,546 rows of data, including account IDs, phone numbers, account statuses, and device counts[1]. Twilio confirmed that this data was obtained through an unauthenticated API endpoint, which has since been secured[1]. While no sensitive data like passwords were compromised, this breach poses potential risks for Authy users. The exposed phone numbers could be used for SMS phishing (smishing) attacks or SIM swapping attempts, particularly if cross-referenced with data from other breaches[1]. In response, Twilio has released security updates for both Android (v25.1.0) and iOS (v26.1.0) Authy apps. Users are strongly advised to update their apps and remain vigilant against potential phishing attempts[1]. To protect yourself: 1. Update your Authy app immediately 2. Be wary of suspicious SMS messages 3. Secure your mobile account against unauthorized number transfers 4. Consider using alternative MFA methods where possible This incident serves as a stark reminder of the importance of API security and the potential consequences of leaving endpoints unsecured[1]. Sources [1] Hackers abused API to verify millions of Authy MFA phone numbers https://lnkd.in/guQ8mMkh

Hackers abused API to verify millions of Authy MFA phone numbers

Hackers abused API to verify millions of Authy MFA phone numbers

bleepingcomputer.com

To view or add a comment, sign in

Explore topics