Security researchers from Nepal recently discovered a new vulnerability in the login system of Meta's Facebook, Instagram and other applications, allowing anyone to bypass Facebook's two-factor authentication. "Anyone can exploit this vulnerability to bypass SMS-based two-factor authentication if they know the recipient's phone number," researcher Gtm Mänôz told TechCrunch. Mänôz said the vulnerability existed in Meta Group's unified login system, where Meta did not set an attempt limit when users entered the two-factor code used to log into their accounts. This means that all an attacker needs to know is the target's phone number or email address, and they can brute force the two-factor SMS code. Once the attacker obtains the correct verification code, the attacker can then launch subsequent attacks. It is understood that even after the attacker successfully attacks, Meta will remind the user that the account has been linked to someone else's account, so two-factor authentication is disabled. Mänôz reported the bug to the company last year, and Meta has now fixed the vulnerability. Meta eventually paid him $27,200 (currently about 184,000 RMB) for his discovery. |
>>: How to use ip command to manage network in Linux
From ride-hailing algorithms to customer service ...
RackNerd launched several special packages during...
Traditional switch operating systems (NOS) are a ...
Friendhosting launched a promotion for Christmas ...
In the past, people settled near the banks of riv...
What is the difference between the Internet of Id...
[51CTO.com original article] On March 22, Huawei ...
The three major operators released their operatin...
On October 27, CCTV News reported last night that...
We’ve written quite a bit about Wi-Fi, but what I...
Not long after I entered college, I encountered a...
Founded in 2014, ExtraVM is a foreign hosting com...
Since last year, there has been an increasing amo...
Bulgarian hosting provider AlphaVPS also launched...
[51CTO.com original article] The general public...