top | item 42816100

(no title)

philfreo | 1 year ago

Can someone explain point #9 in the gist? How’d they know part of the two factor code?

discuss

order

jsnell|1 year ago

It's not a two-factor code like you're thinking of. That code is shown on the sign-in / account recovery page, to whoever making that attempt. Then the same value has to be chosen on the mobile device that's being used to authenticate that sign-in.

The goal isn't to protect against phishing or social engineering, but against people accidentally approving a sign-in they didn't initiate.

joshuamorton|1 year ago

(specifically, there are "credential stuffing" style sign-in attacks where an attacker logs in "suspiciously" at the same time as a legit log in, possibly after forcing a log-out, hoping you approve both your log in and theirs when you get two, or ten pop-ups)

ekimekim|1 year ago

What I'm confused by is how they got that far, to the point that 2FA was the only thing in their way. Did they already have this user's password?