So you've created a strong password,bunuel eroticism kept an eye out for sketchy links, and enabled two-factor authentication — what could possibly go wrong?
Well, it turns out the answer is "you."
SEE ALSO: Here's what we know about alleged NSA leaker Reality Leigh WinnerAs the leaked NSA report on Russian efforts to hack the computers of U.S. election officials before the 2016 presidential election demonstrates, we are all often our own biggest security weakness. The document, published by The Intercept, shows that hackers found a way around the protections offered by two-factor authentication that is striking in its simplicity: They asked the targets for their verification codes.
"If the victim had previously enabled two-factor authentication (2FA)," explains a slide detailing the Russian attack, "the actor-controlled website would further prompt the victim to provide their phone number and their legitimate Google verification code that was sent to their phone."
To translate, after tricking victims into entering their email and password into a fake Google site, the hackers found that some victims had 2FA set up on their accounts. This meant that even with the password, hackers were unable to gain access to the Gmail accounts in question — that is, unless they could get the verification codes as well.
So, again, they just straight up asked for them.
"Once the victim supplied this information to the actor-controlled website, it would be relayed to a legitimate Google service, but only after [redacted] actors had successfully obtained the victim's password (and if two-factor, phone number and Google verification code) associated with that specific email account."
Basically, the hackers were able to bypass the email security measures by requesting that the victims give them the keys to the digital castle.
Once access was gained to the accounts, which reportedly belonged to an electronic-voting vendor, the hackers would then email election officials from the hacked accounts and attempt to trick those same officials into opening script-laden Word docs that would compromise their computers.
It's an elaborate bit of spear phishing, and it reminds us that no matter what digital security practices we put in place, we can all still slip up.
In the face of everyday online threats, the best defense (other than setting up 2FA — which you should definitely still do) might be the simplest: exercise caution with every email you receive, and be paranoid as hell.
In the face of skilled Russian hackers? Well, that one's trickier, but maybe start with not handing over your email password, phone number, and 2FA verification code.
Topics Cybersecurity Elections
(Editor: {typename type="name"/})
The 5 most inappropriate things Donald Trump said at a Puerto Rico disaster briefing
EPA's leader is open to reconsidering crucial climate assessment
Chinese scientists have cloned two monkeys to advance human medicine
Antigua GFC vs. Seattle Sounders 2025 livestream: Watch Concacaf Champions Cup for free
Wordle today: The answer and hints for March 2, 2025
NYT Connections Sports Edition hints and answers for March 4: Tips to solve Connections #162
Impact of Temperature on Intel CPU Performance
Skates in the deep sea may incubate eggs near 'black smoker' vents
The State of 5G: When It's Coming, How Fast It Will Be & The Sci
Yes, that was Ke Huy Quan on the phone in 'The White Lotus' Season 3
What is Vcore and How Does It Help with Overclocking?
Best monitor deal: Get $350 off the Samsung Odyssey OLED G6 gaming monitor at B&H Photo
接受PR>=1、BR>=1,流量相当,内容相关类链接。