Installa Steam
Accedi
|
Lingua
简体中文 (cinese semplificato)
繁體中文 (cinese tradizionale)
日本語 (giapponese)
한국어 (coreano)
ไทย (tailandese)
Български (bulgaro)
Čeština (ceco)
Dansk (danese)
Deutsch (tedesco)
English (inglese)
Español - España (spagnolo - Spagna)
Español - Latinoamérica (spagnolo dell'America Latina)
Ελληνικά (greco)
Français (francese)
Indonesiano
Magyar (ungherese)
Nederlands (olandese)
Norsk (norvegese)
Polski (polacco)
Português (portoghese - Portogallo)
Português - Brasil (portoghese brasiliano)
Română (rumeno)
Русский (russo)
Suomi (finlandese)
Svenska (svedese)
Türkçe (turco)
Tiếng Việt (vietnamita)
Українська (ucraino)
Segnala un problema nella traduzione
what makes a hacker be able to circumvent
a) sms on an old phone
b) sms in general
c) the app
more likely than it was in the past?
a),b) Attacker can con a mobile network operators to redirect the SMS to their phone.
a),b) Attackers can easily exploit SS7 to spoof phone numbers, intercepting calls or sms.
a),b) There are also numerous malicious Apps that capture SMS codes sent.
a),b) SMS could be delivered through a VoIP network rather than a mobile carrier
a),b) NIST recommends to not use SMS anymore for 2FA in DAG800-63B
c) 2FA Apps need to be hardened against hackers and malicious Apps
c) 2FA Apps should never ever have the whole login info like steams does
c) 2FA Apps also should have physical presence proof (OnScreen Matrix, offline button etc.)
The new recommendation are:
- Hardware dongles based on the U2F standard from the FIDO Alliance
- Hardware tokens that generate time-based codes (keyfobs)
- Apps that generates time-based codes, such as the Google Authenticator app.
- Systems that use encrypted push notifications to phones (not identified by mobilenumber)
For the last two the apps need to be hardened, all communication fully encrypted, not rely on any mobilenumbers, provide no login information to a potential attacker, if possible use some sort of physical presence proof like onscreen matrix that needs to be scanned with camera by user or similar.
Just contact them and give them all the info (about the trades too).
And on the posts here delete all the peoples names and links to profiles because naming and shaming is against the rules.
If you think a device is no longer safe(pc, mobile or whatever) just make a clean install of the OS or reset to default on the mobile. I hope you can get the account back.
But these points, are you sure its still the case? I thought by now sim cards are more protected. And only one card can be running at time.
Does the attacker need local transmission presence to your phone to intercept? Do the providers not raise a red flag any time the same "user" is active in two cells?