Hackers Use Phishing Emails to Harvest Two-Factor Gmail Codes

Hackers Use Phishing Emails to Harvest Two-Factor Gmail Codes

Conventional wisdom says that adding two-factor authentication (2FA) will keep your accounts safe from most phishing scams, but a new wave of sophisticated automated attacks is reminding us that 2FA isn’t infallible. As with all security measures, it’s only as secure as the weakest link — the human one. The new phishing campaign tricks people into handing over their account details and their 2FA tokens.

The report comes from Amnesty International, which doesn’t usually publicize cybersecurity news. In this case, Amnesty has a stake in things because the attacks have mainly targeted activists and journalists in the Middle East and North Africa. As Amnesty explains, there are several distinct phishing campaigns ongoing that are likely linked.

In the most sophisticated campaign, the attackers have targeted hundreds of Yahoo and Google accounts used by activists. The goal is to bypass two-factor protections and gain access to the account. Examining the suspicious emails flagged by activists in 2017 and 2018, Amnesty found links that claim to be security alerts. However, they redirect to a fake page that harvests account details. That’s not unique, but the next phase steps it up.

After the target entered a username and password, the malicious sites would remotely log into the account. It then requested a code via SMS if the account had two-factor enabled. The fake site asked for the code, which wouldn’t seem out of the ordinary — you’d have to put a 2FA code in during a normal login. However, the malicious site used that code to log into the account remotely before the token expired. The user would be prompted to change their password, which the attacker would then save for later use.

A fake Gmail login page requesting the 2FA code.
A fake Gmail login page requesting the 2FA code.

The second and third campaigns used similar tactics but focused on users of the encrypted email services Protonmail and Tutanota. In both cases, the attackers registered seemingly authentic domains with fake login pages. These domains have since been shut down.

Amnesty International believes Gulf states are behind the phishing campaigns, hoping to gather information on dissidents and protesters in their countries. Let this be a reminder that two-factor authentication is not a silver bullet. You still need to be wary of emails with links to external pages. You should only input your account credentials on sites that you have confirmed are the real deal.

Continue reading

Source Code Stolen from Cyberpunk 2077 Developer Reportedly Sold
Source Code Stolen from Cyberpunk 2077 Developer Reportedly Sold

Polish game developer CD Projekt Red (CDPR) announced earlier this week that it had been the victim of a ransomware hack. As part of the operation, the attackers stole internal documents and source code, which they threatened to sell if CDPR declined to pay the ransom. Cybersecurity experts now say that the hacking group has followed through and sold the stolen data for an undisclosed sum.

New Ransomware Demands Discord Gift Codes Instead of Crypto
New Ransomware Demands Discord Gift Codes Instead of Crypto

Rather than asking victims to pay the ransom with cryptocurrency, it asks for a Discord gift card.

YouTube Designed Its Own Video Transcoding Hardware
YouTube Designed Its Own Video Transcoding Hardware

YouTube has developed its own video transcoding chips to break bottlenecks imposed by the slowing of Moore's Law.

Introducing TRACBench, a New AI-Powered Transcoding Benchmark
Introducing TRACBench, a New AI-Powered Transcoding Benchmark

Three of the fastest workstation CPUs on Earth slug it out in an AI-powered transcoding benchmark we designed to scale from dual-core to 64-core systems.