Security researchers from Nepal recently discovered a new vulnerability in the login system of Meta's Facebook, Instagram and other applications, allowing anyone to bypass Facebook's two-factor authentication. "Anyone can exploit this vulnerability to bypass SMS-based two-factor authentication if they know the recipient's phone number," researcher Gtm Mänôz told TechCrunch. Mänôz said the vulnerability existed in Meta Group's unified login system, where Meta did not set an attempt limit when users entered the two-factor code used to log into their accounts. This means that all an attacker needs to know is the target's phone number or email address, and they can brute force the two-factor SMS code. Once the attacker obtains the correct verification code, the attacker can then launch subsequent attacks. It is understood that even after the attacker successfully attacks, Meta will remind the user that the account has been linked to someone else's account, so two-factor authentication is disabled. Mänôz reported the bug to the company last year, and Meta has now fixed the vulnerability. Meta eventually paid him $27,200 (currently about 184,000 RMB) for his discovery. |
>>: How to use ip command to manage network in Linux
This article intends to discuss gateways around s...
2023 has officially begun, and RAKsmart has launc...
Qualcomm, Telstra, Ericsson and NETGEAR recently ...
LOCVPS has released a permanent 50% discount coup...
Entering the digital age, digital survival abilit...
This article introduces how Flink Hudi continuous...
On October 26, the Ministry of Industry and Infor...
Although Wi-Fi 6 wireless technology has been aro...
Mobile edge computing (MEC) has attracted a lot o...
10gbiz has released a new discount plan, offering...
This month, ZJI launched a new model A in Kwai Wa...
Today I will share with you some knowledge about ...
On May 7, the Ministry of Industry and Informatio...
Do you remember your first kiss? This is a common...