// Hacking NEWS // How Some Android Malware Intercept Secret Codes Sent By SMS

in #news5 years ago

Hackers have invented a new scam technique to bypass two-factor authentication. Here's how not to get caught.

6c049e70f71a8101c9a7263b48964.jpg

Enabling two-factor authentication is, in principle, always a good idea. But if the single-use secret codes are received by SMS on an infected smartphone, this is obviously a problem.

Figure1-WM-1024x556.png

To limit this risk, Google limited application access to SMS last March. But pirates have managed to get around this new obstacle. Eset security researchers have found mobile applications for Turkish users who, once installed, request access to notifications.

97f59a68b6f24ca947ae102f943f5.jpg

It may seem trivial, but it's actually very clever. Access to notifications allows the application to intercept the text that is displayed in these alerts. However, it is not uncommon for this text to already contain the secret code in the case of double authentication.

If the hacker has already managed, in the first instance, to collect the corresponding login and password, he can then completely usurp the user's identity. This technique works for codes sent not only by SMS, but also by e-mail.

The app has filters in place to target only notifications from apps whose names contain the keywords “gm, yandex, mail, k9, outlook, sms, messaging”, as seen there:

Figure-5-WM.png

To avoid being fooled, it is important to avoid granting the right of access to notifications for any application. It is also necessary, as far as possible, to favour a double authentication system based on a dedicated mobile application such as Google Authenticator or Microsoft Authenticator. They do not use the notification system.

Source: Eset

Stay Informed, Stay Safe

DQmdpsoEfLe5nRg4Q1oKWHNjLdMnAucCYfRou1yF5Yiwrzs.png

DQmNuF3L71zzxAyJB7Lk37yBqjBRo2uafTAudFDLzsoRV5L.gif

Coin Marketplace

STEEM 0.17
TRX 0.13
JST 0.028
BTC 56576.23
ETH 3024.80
USDT 1.00
SBD 2.29