{"id":1981748,"date":"2023-02-26T21:10:56","date_gmt":"2023-02-27T02:10:56","guid":{"rendered":"https:\/\/wordpress-1016567-4521551.cloudwaysapps.com\/plato-data\/beware-rogue-2fa-apps-in-app-store-and-google-play-dont-get-hacked\/"},"modified":"2023-02-26T21:10:56","modified_gmt":"2023-02-27T02:10:56","slug":"beware-rogue-2fa-apps-in-app-store-and-google-play-dont-get-hacked","status":"publish","type":"station","link":"https:\/\/platodata.io\/plato-data\/beware-rogue-2fa-apps-in-app-store-and-google-play-dont-get-hacked\/","title":{"rendered":"Beware rogue 2FA apps in App Store and Google Play \u2013 don\u2019t get hacked!"},"content":{"rendered":"
\n
by<\/span> Paul Ducklin<\/a> <\/div><\/div>\n

Thanks to Tommy Mysk<\/strong> and Talal Haj Bakry<\/strong> of @mysk_co<\/a> for the impetus and information behind this article. The duo describe themselves as \u201ctwo iOS developers and occasional security researchers on two continents.\u201d In other words, although cybersecurity isn\u2019t their core business, they\u2019re doing what we wish all programmers would do: not taking application or operating system security features for granted, but keeping their own eyes on how those features work in real life, in order to avoid tripping over other people\u2019s mistakes and assumptions.
The featured image above is based on one of their tweets, which you can see in full below.<\/em><\/p>\n

Twitter recently announced<\/a> that it doesn\u2019t think SMS-based two-factor authentication (2FA) is secure enough any more.<\/p>\n

Ironically, as we explained last week, the very users for whom you\u2019d think this change would be most important are the \u201ctop tier\u201d Twitter users \u2013 those who pay for a Twitter Blue badge to give them more reach and to allow them to send longer tweets\u2026<\/p>\n

\u2026but those pay-to-play users will be allowed to keep using text messages (SMSes) to receive their 2FA codes.<\/p>\n

The rest of us need to switch over to a different sort of 2FA system within the next three weeks (before Friday 2023-03-17).<\/p>\n

That means using an app that generates a secret \u201cseeded\u201d sequence of one-time codes, or using a hardware token, such as a Yubikey, that does the cryptographic part of proving your identity.<\/p>\n