So you've created a strong password,War Archives kept an eye out for sketchy links, and enabled two-factor authentication — what could possibly go wrong?
Well, it turns out the answer is "you."
SEE ALSO: Here's what we know about alleged NSA leaker Reality Leigh WinnerAs the leaked NSA report on Russian efforts to hack the computers of U.S. election officials before the 2016 presidential election demonstrates, we are all often our own biggest security weakness. The document, published by The Intercept, shows that hackers found a way around the protections offered by two-factor authentication that is striking in its simplicity: They asked the targets for their verification codes.
"If the victim had previously enabled two-factor authentication (2FA)," explains a slide detailing the Russian attack, "the actor-controlled website would further prompt the victim to provide their phone number and their legitimate Google verification code that was sent to their phone."
To translate, after tricking victims into entering their email and password into a fake Google site, the hackers found that some victims had 2FA set up on their accounts. This meant that even with the password, hackers were unable to gain access to the Gmail accounts in question — that is, unless they could get the verification codes as well.
So, again, they just straight up asked for them.
"Once the victim supplied this information to the actor-controlled website, it would be relayed to a legitimate Google service, but only after [redacted] actors had successfully obtained the victim's password (and if two-factor, phone number and Google verification code) associated with that specific email account."
Basically, the hackers were able to bypass the email security measures by requesting that the victims give them the keys to the digital castle.
Once access was gained to the accounts, which reportedly belonged to an electronic-voting vendor, the hackers would then email election officials from the hacked accounts and attempt to trick those same officials into opening script-laden Word docs that would compromise their computers.
It's an elaborate bit of spear phishing, and it reminds us that no matter what digital security practices we put in place, we can all still slip up.
In the face of everyday online threats, the best defense (other than setting up 2FA — which you should definitely still do) might be the simplest: exercise caution with every email you receive, and be paranoid as hell.
In the face of skilled Russian hackers? Well, that one's trickier, but maybe start with not handing over your email password, phone number, and 2FA verification code.
Topics Cybersecurity Elections
Huawei releases smart driving app HIMA · TechNodeMeituan executive says competition with Douyin is fierce and unlikely to end soon · TechNodeHorizon Robotics invests in Didi’s selfTesla ChinaChinese audio giant Ximalaya denies reports of 30% layoff amid cost cutting · TechNodeBeijing unveils blueprint to boost energy load shifting from EV charging · TechNodeJD Logistics upgrades “nextTesla ChinaMeituan executive says competition with Douyin is fierce and unlikely to end soon · TechNodeLi Auto delays launch of first battery EV til March · TechNodeTencent Games announces 16TSMC chairman Mark Liu to retire in June 2024 · TechNodeJD announces salary increases for all retail employees, doubling pay for “frontDada identified “suspicious practices” in internal audit, shares slump · TechNodeTikTok likely to revive eTesla exports materials from China for 4680 battery production in Texas: report · TechNodeLi Auto to use Nvidia’s nextFoxconn expands its server assembly business in Mexico with $10 million investment · TechNodeXiaomi responds to automatic opening of smart door lock · TechNodeChina’s Dongfeng starts pre China unveils world’s first automated AI Stellantis Xiaomi SU7 Ultra becomes the first Chinese car in Gran Turismo racing game · TechNode China’s Xpeng aims to double sales and break even this year: CEO · TechNode AMD reportedly drops Samsung 4nm orders, moves to TSMC’S Arizona fab · TechNode Honor reveals design of Honor 400 series smartphones ahead of global launch · TechNode China’s Xpeng showcases EVs at Milan Design Week, makes foray into Italy · TechNode Xiaomi Redmi Turbo 4 Pro reaches one million units sold in under a month · TechNode Japan’s Nissan receives more than 20,000 non Hong Kong unveils HK$10B fund to push AI and robotics, bets on upstream R&D · TechNode Luo Yonghao's digital avatar draws over 13 million viewers in AI Tencent launches AI tool for college application advice post Tencent reports $8.26 billion in gaming revenue for Q1, up 24% y Alibaba shares fall after Q4 earnings miss expectations despite AI and e Xiaomi clarifies Xuanjie O1 was not custom NetEase to launch mobile adaptation of survival game Frostpunk tomorrow · TechNode NIO Onvo SUVs reportedly bought for high iPhone Pro now eligible for China’s national subsidy program · TechNode Douyin reveals algorithm amid government push · TechNode DJI launches Mavic 4 Pro with 360° camera rotation and 100MP Hasselblad sensor · TechNode
2.7061s , 10131.453125 kb
Copyright © 2025 Powered by 【War Archives】,Evergreen Information Network