Saw a video of a youtuber that got his account overtaken which has 2fa enabled (not sure which method but I’m thinking sms). He says he didn’t get phished, downloaded anything and his session cookies weren’t stolen and I believe him. The only clue is that he received a sms otp from google but was invalid when he inputted it which let’s me to believe he relied on SMS for 2fa in the first place. My theory is he reused passwords and his number was overtaken but I’m not sure if that’s the case since he did receive the google otp so that leaves out the common phone rep social engineering methods of porting out and fowarding. What else could it be? My paranoia is kinda acting up
Tldr: A YouTuber’s account was hacked despite having 2FA. While unsure of the exact method, potential factors include relying on SMS OTP and the possibility of password reuse. No session cookies were stolen, nothing downloaded and no links clicked
Edit for timestamp: its kinda difficult since he jumps around a lot but he begins to talk about it around the 2min 30sec mark and stops at around the 6min mark
IIRC they can steal a login cookie and thereby circumvent 2FA.
this is what happened to Linus Tech Tips channel: https://www.theverge.com/2023/3/24/23654996/linus-tech-tips-channel-hack-session-token-elon-musk-crypto-scam
I’ve also seen social engineering attacks where they trick a cell phone company into cloning a SIM card
PSA: SMS 2FA is not secure! Use a hardware key or mobile app instead
He did talk about session cookies/tokens in the video which is a possibility but I’m under the impression that this is not what happened since he was already aware of that possibility and didn’t do anything to facilitate that.
deleted by creator
I believe there is another method where you can intercept an SMS text somehow. I read about it a while back so I don’t know the specifics, but I know that since SMS is unsecure there is a way to grab the data while it’s being sent to you