Post
Topic
Board Bitcoin Discussion
Re: A new malware designed to beat 2-fa authentication
by
aoluain
on 01/02/2019, 06:55:45 UTC
Google Chrome and Apple Safari cookies are stolen.
Saved usernames and credit card information from Chrome are stolen.
Text messages backed up to Mac are stolen from victims’ iPhone.
Browser cookies are stolen to defeat login anomaly detection.
...
With this combination of login credentials and cookies, attackers can often bypass the two-factor authentication process protecting accounts.

sorry if this is a dumb question, but how exactly does this compromise 2FA?

all of the compromised data is browser-based (something you know, not something you have), with the exception of "stolen text messages". but old text messages shouldn't overcome SMS 2-factor authentication because those one-time codes are only good for a very limited time. and if you use TOTP-based 2FA, you should be completely safe.

can somebody walk me through this?

Good question and very relevant,, there must be something else to it.

Personally I have never used Chrome and I didnt fall for the "convenience"
of using it at the expense of compromising privacy.

Chrome allows third-party websites to access your IP address and any
information that site has tracked using cookies. If you care about privacy
at all, you should ditch the browser that supports a company using data
to sell advertisements and enabling other companies to track your online
movements


I have always used Firefox in private mode, I dont allow Firefox to store
my browsing history. This is something the Mozilla foundatuon have
always based the operations on.

We do not collect personally identifiable data, not what you do or what
websites you go to


https://www.fastcompany.com/90174010/bye-chrome-why-im-switching-to-firefox-and-you-should-too

I wonder why it is targeted solely to apple users, android users could surly
be targeted too?