Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    At Bitcoin 2025, Crypto Purists and the MAGA Faithful Collide

    June 5, 2025

    Wing and Walmart are bringing drone delivery to 100 new stores

    June 5, 2025

    Trumpworld Is Fighting Over ‘Official’ Crypto Wallet

    June 5, 2025
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » Twilio alerts Authy two-factor app users that “threat actors” have their phone numbers
    News

    Twilio alerts Authy two-factor app users that “threat actors” have their phone numbers

    News RoomBy News RoomJuly 3, 20242 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email

    Twilio says someone has obtained phone numbers associated with its two-factor authentication service (2FA), Authy, as reported earlier by TechCrunch. In a security alert on Monday, Twilio warns that the “threat actors” may try to use the stolen phone numbers to carry out phishing attacks and other scams.

    The incident follows a 2022 data breach that occurred after a phishing campaign tricked employees into disclosing their login credentials. The attackers accessed data from 163 Twilio accounts and managed to access and register additional devices on 93 Authy accounts.

    Twilio traced this leak back to “an unauthenticated endpoint” that it has since secured. Last week, the threat actor ShinyHunters published a list of 33 million phone numbers from Authy accounts on the dark web. As pointed out by BleepingComputer, the threat actor seems to have obtained the information by inputting a massive list of phone numbers into Authy’s unsecured API endpoint, which would then verify whether they’re associated with the app.

    “We encourage all Authy users to stay diligent and have heightened awareness around the texts they are receiving,” Twilio writes. It adds that it “has seen no evidence that the threat actors obtained access to Twilio’s systems or other sensitive data” and that Authy accounts weren’t compromised. Twilio is advising users to update their Authy apps on Android and iOS (the Authy desktop app has been discontinued).

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleLeak: Basically every spec for Samsung’s Z Fold 6 and Z Flip 6
    Next Article The Hunt for the Most Efficient Heat Pump in the World

    Related Posts

    Wing and Walmart are bringing drone delivery to 100 new stores

    June 5, 2025

    Let’s all do a dramatic reading of Trump and Musk’s mean posts

    June 5, 2025

    Here are three new apps building out the open social web

    June 5, 2025

    Razer’s new translucent Phantom Collection shows off your gamer lights

    June 5, 2025

    How to transfer your original Switch data to a Switch 2

    June 5, 2025

    Snapchat has released an Apple Watch app

    June 5, 2025
    Our Picks

    Wing and Walmart are bringing drone delivery to 100 new stores

    June 5, 2025

    Trumpworld Is Fighting Over ‘Official’ Crypto Wallet

    June 5, 2025

    Let’s all do a dramatic reading of Trump and Musk’s mean posts

    June 5, 2025

    Here are three new apps building out the open social web

    June 5, 2025
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    Gear

    The Best Bike Lights for Getting Home Safe

    By News RoomJune 5, 2025

    Size: If you’re a commuter, you’ll want to remove lights for safekeeping. Look for the…

    Razer’s new translucent Phantom Collection shows off your gamer lights

    June 5, 2025

    Perplexity’s CEO Sees AI Agents as the Next Web Battleground

    June 5, 2025

    How to transfer your original Switch data to a Switch 2

    June 5, 2025
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.