The presentation discusses the broken state of text-based two-factor authentication (2FA) and the techniques used by attackers to bypass it using publicly available data.
- Text-based 2FA is broken and has been for a long time
- Attackers are using publicly available data to bypass 2FA
- The presentation demonstrates techniques used by attackers to bypass 2FA
- The presentation provides recommendations for protecting against 2FA attacks
The presenters share a story about a colleague who received a fraudulent text message from the local police while abroad, highlighting the long-standing issue of SMS spoofing.