Hacker News new | past | comments | ask | show | jobs | submit login
Anatomy of a hack (theverge.com)
22 points by gr2020 on March 4, 2015 | hide | past | favorite | 2 comments



Summary of process:

1. Used mail.com, which was apparently vulnerable to some hack that allows resetting the password for accounts.

2. Hacker was able to setup call forwarding for the person's phone, with only the email address to prove identity ( and perhaps information taken from emails )

3. Hacker was then able to reset gmail account even with two-factor auth, by having the two-factor number read out via voice via call forwarding.

Email is pretty much the problem here entirely. Using an insecure email host, and having access to your email be able to access thousands of dollars worth of bitcoins... is terrible.

Do you trust email hosts in general? I certainly don't.


Related to #1: Mail.com doesn't offer two-factor auth, which is disgraceful.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: