Discover Cryptography News
Cybercriminals Bypassing Two-Factor Authentication
One technique that the fraudsters have been using to bypass security controls is call forwarding.
"[B]anks that rely on voice telephony for user transaction verification have seen those systems and processes compromised by thieves who persuade telecom carriers to forward legitimate user phone calls to the thief's cell phone," the report says. "These targeted attacks have resulted in theft of money and/or information, if the bank has no other defenses sufficient to prevent unauthorized access to their applications and customer accounts."
The link for this article located at Dark Reading is no longer available.