Hackers Gain Access To Authy 2FA Accounts In Twilio Breach

Share post:

Authy, a two-factor authentication (2FA) service used by Twilio, was accessed by attackers after compromising the provider of programmable communication tools Twilio.

Researchers say the Twilio data breach is part of a larger campaign of cyberattacks targeting more than 300 organizations.

According to Twilio, the attackers who gained access to its infrastructure on August 4 were also able to access the accounts of 93 Authy users and linked devices to those accounts.

Although Twilio stated that the compromised Authy accounts belong to individual users and represent only a small fraction of the total of 75 million users, the 93 compromised users mean that the attackers were able to access the 2FA codes generated for the Authy users’ accounts.

Twilio revealed that 163 Twilio users whose data was accessed by the attackers for a limited period of time were notified by the company of the unauthorized access.

To protect their accounts, users are asked to review any linked account(s) for suspicious activity, review all devices connected to their Authy accounts, and add a backup device while disabling “Allow Multi-device” in the Authy application.

The sources for this piece include an article in BleepingComputer.

SUBSCRIBE NOW

Related articles

AT&T Fined $13 Million for Supply Chain Data Breach

AT&T has agreed to pay a $13 million fine following a significant data breach that exposed information of...

Supply Chain Attack Weaponizes Communication Devices in Lebanon

A sophisticated supply chain attack has turned everyday communication devices into weapons in Lebanon, marking a new era...

Chinese Botnet “Raptor Train” Infects 260,000 Devices Worldwide

A massive Chinese botnet dubbed "Raptor Train" has been disrupted by the FBI and cybersecurity researchers. This sophisticated...

Multi-year spear-phishing campaign finally caught

U.S. federal prosecutors have indicted Wu Song, a Chinese national employed by state-owned Aviation Industry Corporation of China,...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways