Smishmash - Text Based 2fa Spoofing Using OSINT, Phishing Techniques and a Burner Phone

In recent years the data leaks have escalated, and leaked passwords and usernames have become a common attack vector in phishing attacks. Until recently phone numbers were commonly overlooked by attackers as well as red teams. This year has seen an increase in attacks circumventing text based 2fa.
In this talk, the researchers will show how it's possible to gather data from publicly available sources and connect the phone numbers most likely used by two factor authentication systems to other leaked email and login credentials.
Presented by: Thomas Olofsson & Mikael Byström
Full Abstract and Presentation Materials: www.blackhat.com/us-22/briefi...

Пікірлер