HomeTechnologyA hacker found a...

A hacker found a bug that could bypass Facebook’s two-step verification

The vulnerability allowed changing the settings of the two-step verification system in Facebook. | Font: Photo by Solena Feyissa on Unsplash

adUnits.push({
code: ‘Rpp_tecnologia_facebook_Nota_Interna1’,
mediaTypes: {
banner: {
sizes: (navigator.userAgent.match(/iPhone|android|iPod/i)) ? [[300, 250], [320, 460], [320, 480], [320, 50], [300, 100], [320, 100]] : [[300, 250], [320, 460], [320, 480], [320, 50], [300, 100], [320, 100], [635, 90]]
}
},
bids: [{
bidder: ‘appnexus’,
params: {
placementId: ‘14149971’
}
},{
bidder: ‘rubicon’,
params: {
accountId: ‘19264’,
siteId: ‘314342’,
zoneId: ‘1604128’
}
},{
bidder: ‘amx’,
params: {
tagId: ‘MTUybWVkaWEuY29t’
}
},{
bidder: ‘oftmedia’,
params: {
placementId: navigator.userAgent.match(/iPhone|android|iPod/i) ? ‘22617692’: ‘22617693’
}
}]
});

Hacker found a bug in the app facebook which allowed users to bypass 2-step authentication when logging in.

Gtm Mänôz, a researcher in Nepal, realized that hackers would only be able to access their profiles by knowing the phone number of the account they were logged into.

Vulnerabilities in Facebook

According to the white hat hacker, using the victim’s phone number, the criminals could go to the Meta account center, which helps users link their company accounts, for example facebook, Instagram and Messenger to link this number to your account and then force a two-factor SMS code. At this time, there will be no upper limit on the number of attempts.

In this case, the attacker links his Facebook account with the victim’s phone number. A successful attack will still cause Meta to send a message to the victim that their double factor is disabled because their phone number is linked to someone else’s account.

Theoretically, at this point, an attacker could try to take over the account. facebook from the victim, simply by phishing to get the password, since the target no longer had two-factor enabled.

Facebook responds

The researcher discovered the bug in 2022 and reported it to the company in September. Target corrected the error and paid him a $27,000 reward.

Gabby Curtis, Representative Targetpointed to TechCrunch that the login system was under testing at the time of the error. The company said that this is not a vulnerability used to steal accounts.

We recommend you METADATA, an RPP technology podcast. News, analytics, reviews, recommendations and everything you need to know about the world of technology.

Source: RPP

- A word from our sponsors -

Most Popular

LEAVE A REPLY

Please enter your comment!
Please enter your name here

More from Author

- A word from our sponsors -

Read Now

APU boys fell based on Toretsky, ES from Bend – Zelensky

The Ukrainian military was ambushed in the direction of Toretsky. .in_text_content_22 {width: 300px; Height: 600px; } @Media (min-width: 600px) {.in_text_content_22 {width: 580px; Height: 400px; }} .Adsbygoogle {Touch-Action: Manipulation; } There are victims among the defenders. The invaders will be destroyed, and...

Russian Federation Throw Dronov from Curtains to Donbass – ISW

The country of the aggressor turned off the units of drones from the Kursk region to Donbas. .in_text_content_22 {width: 300px; Height: 600px; } @Media (min-width: 600px) {.in_text_content_22 {width: 580px; Height: 400px; }} .Adsbygoogle {Touch-Action: Manipulation; } The uncertain units of the...

Russia was caused by a provocation in Donetsk – in CPD they were fired in

The explosion in the occupied Donetsk was organized on April 20 by the invaders themselves. .in_text_content_22 {width: 300px; Height: 600px; } @Media (min-width: 600px) {.in_text_content_22 {width: 580px; Height: 400px; }} .Adsbygoogle {Touch-Action: Manipulation; } The Russian country aggressor arranged this provocation...

The dangers were attacked by the evacuation car of the drone in Donetsk (photo)

The country of the aggressor in an Easter truce attacked a volunteer car in Donetsk. .in_text_content_22 {width: 300px; Height: 600px; } @Media (min-width: 600px) {.in_text_content_22 {width: 580px; Height: 400px; }} .Adsbygoogle {Touch-Action: Manipulation; } The employee of the Prostisk Humanitarian Mission...