So you've created a strong password,Watch Peaky Blinders kept an eye out for sketchy links, and enabled two-factor authentication — what could possibly go wrong?
Well, it turns out the answer is "you."
SEE ALSO: Here's what we know about alleged NSA leaker Reality Leigh WinnerAs the leaked NSA report on Russian efforts to hack the computers of U.S. election officials before the 2016 presidential election demonstrates, we are all often our own biggest security weakness. The document, published by The Intercept, shows that hackers found a way around the protections offered by two-factor authentication that is striking in its simplicity: They asked the targets for their verification codes.
"If the victim had previously enabled two-factor authentication (2FA)," explains a slide detailing the Russian attack, "the actor-controlled website would further prompt the victim to provide their phone number and their legitimate Google verification code that was sent to their phone."
To translate, after tricking victims into entering their email and password into a fake Google site, the hackers found that some victims had 2FA set up on their accounts. This meant that even with the password, hackers were unable to gain access to the Gmail accounts in question — that is, unless they could get the verification codes as well.
So, again, they just straight up asked for them.
"Once the victim supplied this information to the actor-controlled website, it would be relayed to a legitimate Google service, but only after [redacted] actors had successfully obtained the victim's password (and if two-factor, phone number and Google verification code) associated with that specific email account."
Basically, the hackers were able to bypass the email security measures by requesting that the victims give them the keys to the digital castle.
Once access was gained to the accounts, which reportedly belonged to an electronic-voting vendor, the hackers would then email election officials from the hacked accounts and attempt to trick those same officials into opening script-laden Word docs that would compromise their computers.
It's an elaborate bit of spear phishing, and it reminds us that no matter what digital security practices we put in place, we can all still slip up.
In the face of everyday online threats, the best defense (other than setting up 2FA — which you should definitely still do) might be the simplest: exercise caution with every email you receive, and be paranoid as hell.
In the face of skilled Russian hackers? Well, that one's trickier, but maybe start with not handing over your email password, phone number, and 2FA verification code.
Topics Cybersecurity Elections
'Catwoman' was a 's**t movie', says writer of 'Catwoman''The Walking Dead' cast and fans react to Carl's final episodeArctic warm event stuns scientists, as record warmth reaches North PoleWhy Maybelline deleted a tweet about abandoning Snapchat for InstagramDirector Kevin Smith tweets from hospital bed after heart attackDownload this: 'Alto's Odyssey' is the sequel we've been waiting forSikurPhone is a smartphone for Bitcoin millionairesChinese phone makers are building the allWe tried out the LG V30s and its AIHow the Olympics can embrace nonLittle girl screaming when her doll's head pops off makes for a great photoHow to delete your Vero accountEnergizer's Power Max PK16 Pro phone has a massive 16,000 mAh batteryOne Apple repair center has called 911 1,600 times in four monthsHands on with the Samsung Galaxy S9 and Galaxy S9+People are leaving out hats and gloves to help the homeless stay warmWhy the UK has set up a separate fund to further the Time's Up movementGoogle shows off ARCore software with Barcelona stadium Snapchat lens50 Shades of No: A new tHands on with the Samsung Galaxy S9 and Galaxy S9+ The Return of the Old Man from the Upper West Side California governor vetoes bill requiring human drivers in autonomous trucks Amazon Prime Video update: Ad Why do we call celebrities our sons? Walt Whitman, Pop Music Critic A Perfect Summer Song—Erasmo Carlos’s 26 Anos de Vida Normal Where We Live: David Graham’s Photos of American Homes National emergency alert: At The Trollopian Dowagers of Beverly Hills Tracing the Evolution of the Gamine Wordle today: Here's the answer and hints for September 23 Microsoft's acquisition of Activision is essentially a done deal Gian Lorenzo Bernini’s Sculptures Aim to Capture the Soul Listen: Saul Bellow Reads from “Humboldt’s Gift,” 1988 'Quordle' today: See each 'Quordle' answer and hints for September 23, 2023 It's Dante's Birthday, Maybe ... How to preorder the two new Microsoft Surface laptops TikTok's 'Euphoria' High trend heightens the HBO teen drama's absurd fashion Hie We Away to the Woodland Scene Being a Total Bore Is Kind of Interesting
2.2904s , 10131.4765625 kb
Copyright © 2025 Powered by 【Watch Peaky Blinders】,Warmth Information Network