The Long Trade

Share this post

Twilio breach shows massive vulnerability of security measures

longtrade.substack.com

Twilio breach shows massive vulnerability of security measures

When the second factor is compromised

Daniel McKeown
Oct 30, 2022
1
2
Share this post

Twilio breach shows massive vulnerability of security measures

longtrade.substack.com

Twilio is a company that provides customers with 2-factor authentication tools. “2FA” or even multi-factor authentication has become standard security practice for web accounts—users are often asked to confirm actions like logging in or authorizing payments by entering in a code sent to their phone (or email account). One of the major providers of SMS services, Twilio also offers a 2FA app called Authy.

But Twilio got hacked earlier this year. There was a pretty severe compromise:

“Once inside Twilio's systems, the hackers accessed customer data using administrative portals, accessed Authy 2FA accounts and codes, and registered their own devices to obtain temporary tokens.”

So the telephone network is already pretty insecure at the level of user phone numbers (with vulnerabilities like SIM swapping) but now Twilio has also shown worrying weaknesses. As much help as multi-factor authentication can offer, it is not without its leaks.

1

Nothing is watertight, of course, but other companies offer a version of an authentication app—I have used the one from Microsoft for example. These apps generate codes or get them from the Internet instead of using the telephone network—they are hypothetically more secure, but as we have now seen they do rely on a centralized provider to keep data safe.

2

1

At this point the second “factor” always seems to come from some outside source—a phone number, an app, an email, a device—always something exogenous to the person logging in. Possibly, in the future using a second factor based on a user-controlled key could be made more available.

2

Just keep in mind that you have to be careful when changing phones as the authenticator app and its data may not transfer over as smoothly as the phone number does, and that only a small but growing percentage of companies offer using an app-based factor as an option.

2
Share this post

Twilio breach shows massive vulnerability of security measures

longtrade.substack.com
2 Comments
Jessica McKeown
Nov 9, 2022Liked by Daniel McKeown

Do you think we'll see more human parts used for 2FA in the future, like retina scans and finger prints?

Expand full comment
Reply
1 reply by Daniel McKeown
1 more comment…
TopNewCommunity

No posts

Ready for more?

© 2023 Daniel McKeown
Privacy ∙ Terms ∙ Collection notice
Start WritingGet the app
Substack is the home for great writing