Authy Security Breach: What You Need to Know

- Advertisement -

Introduction

Malicious actors have managed to steal more than 33 million phone numbers used by users of the two-factor authentication service Authy. Authy is a popular security application to manage authentication codes for apps and online services. These codes enhance the security of sign-ins, as they need to be entered in a second stage of authentication.

The Breach Details

A threat actor leaked a CSV text file containing 33 million phone numbers of Authy customers. The list was obtained through an improperly secured API endpoint. The attacker fed the API a large number of phone numbers to identify which ones were known to the Authy system. Twilio, Authy’s parent company, confirmed the authenticity of the data and the hack to Bleeping Computer. They have since secured the endpoint and released updates for Android and iOS as a precaution.

Potential Risks

Authy customers cannot determine if their phone number is included in the leak. While there is no direct threat, attackers may use the phone numbers in SMS phishing or SIM swapping attacks. SMS attacks might trick users into sharing authentication codes or downloading malware. SIM swapping attacks are more complex and require additional personal information, often involving the cellular provider of the victim. Attackers could use online searches or other databases to link phone numbers to their owners. However, the data within Authy remains secure at this point.

Steps for Affected Users

For those considering migrating from Authy to another service, be aware that migration is not straightforward due to the lack of export support. A workaround exists using an older version of the desktop app, but this may soon be obsolete as Authy is discontinuing the desktop program. The only other option is manual migration:

  • Sign in to the service that codes are generated for in Authy.
  • Turn off 2FA in the preferences.
  • Re-enable 2FA using a new authenticator app.
  • Repeat for each service and delete them from Authy after migration.

As alternatives, consider open-source authenticators like Aegis or Bitwarden Authenticator.

Closing Words

Should you trust a service that has experienced several breaches, or move to one that has not? LastPass customers have faced similar dilemmas in the past. Whether to migrate is a personal choice, often dictated by convenience and trust levels. If you use authenticator apps, which is your preferred one at the moment?

- Advertisement -

Related articles

Exploring Underrail 2: Infusion – A Glimpse into the Isometric Apocalypse

Welcome Back to the Underground Fans of Underrail, rejoice! The...

Hollywood Animal: Your Ticket to Tycoon Chaos

Step Into the Shadows of Tinseltown Have you ever wondered...

WhatsApp’s New ‘Chat with Us’ Feature: A Game Changer for Support

Introducing the 'Chat with Us' Feature In an era where...

OnePlus Pad (2024): A Familiar Face with a Splash of Color

Introduction to the OnePlus Pad (2024) The recently launched OnePlus...

Samsung Galaxy A56 Leaks: A Game Changer for Charging Speeds

Introduction to the Galaxy A56 The buzz surrounding the Samsung...
Carl S. Seibel
Carl S. Seibel
1263 Twin House Lane Springfield, MO 65806