Smishing Exploit Targets Cellular Routers to Intercept 2FA Codes

A new smishing exploit has been discovered targeting cellular routers, allowing attackers to intercept two-factor authentication (2FA) codes. This attack vector leverages the vulnerabilities in cellular routers used by individuals and organizations to gain unauthorized access to sensitive accounts. The exploit involves sending deceptive SMS messages that trick users into interacting with malicious links or commands, which then compromise the router's security. Once compromised, attackers can intercept 2FA codes sent via SMS, effectively bypassing an important layer of security. Cellular routers, widely used for internet connectivity in homes and businesses, have become a focal point for cybercriminals due to their often overlooked security configurations. The smishing campaign exploits these weaknesses by targeting the router's SMS functionality, a feature intended for legitimate management and notifications. By manipulating this feature, attackers can redirect or capture SMS messages containing 2FA codes, enabling them to breach accounts protected by two-factor authentication. This emerging threat highlights the need for enhanced security measures on cellular routers, including firmware updates, strong authentication for router management interfaces, and user awareness about smishing tactics. Organizations and individuals should regularly check for router firmware updates and configure their devices to restrict SMS management capabilities to trusted sources only. The smishing exploit underscores the evolving tactics of cyber adversaries who continuously seek to undermine multi-factor authentication mechanisms. Security professionals must prioritize monitoring and mitigating such threats by implementing comprehensive security policies and educating users about the risks of interacting with unsolicited SMS messages. In conclusion, the smishing exploit targeting cellular routers represents a significant risk to the integrity of two-factor authentication systems. Proactive security measures, combined with user vigilance, are essential to defend against this sophisticated attack vector and protect sensitive digital assets.

This Cyber News was published on www.infosecurity-magazine.com. Publication date: Tue, 30 Sep 2025 15:45:08 +0000


Cyber News related to Smishing Exploit Targets Cellular Routers to Intercept 2FA Codes

Smishing Exploit Targets Cellular Routers to Intercept 2FA Codes - A new smishing exploit has been discovered targeting cellular routers, allowing attackers to intercept two-factor authentication (2FA) codes. This attack vector leverages the vulnerabilities in cellular routers used by individuals and organizations ...
1 week ago Infosecurity-magazine.com
MFA vs 2FA: Which Is Best for Your Business? - If a user falls for a phishing scam and their credentials are compromised, multi-factor authentication or two-factor authentication provide an additional safeguard against a breach. MFA uses authentication factors such as a pin, an SMS code, an ...
1 year ago Techrepublic.com
New phishing attack steals your Instagram backup codes to bypass 2FA - A new phishing campaign pretending to be a 'copyright infringement' email attempts to steal the backup codes of Instagram users, allowing hackers to bypass the two-factor authentication configured on the account. Two-factor authentication is a ...
1 year ago Bleepingcomputer.com
GitHub warns users to enable 2FA before upcoming deadline - GitHub is warning users that they will soon have limited functionality on the site if they do not enable two-factor authentication on their accounts. In emails sent to GitHub users on Christmas Eve, the company warned that all users contributing code ...
1 year ago Bleepingcomputer.com
Phishing Campaign Targets Instagram Users, Steals Backup Codes and Circumvent 2FA Protection - A recent phishing scheme has emerged, posing as a 'copyright infringement' email to deceive Instagram users and pilfer their backup codes. These codes, integral for the recovery of accounts, are used to circumvent the two-factor authentication ...
1 year ago Cysecurity.news
Payoneer accounts in Argentina hacked in 2FA bypass attacks - Numerous Payoneer users in Argentina report waking up to find that their 2FA-protected accounts were hacked and funds stolen after receiving SMS OTP codes while they were sleeping. Payoneer is a financial services platform providing online money ...
1 year ago Bleepingcomputer.com
Here's How To Steer Clear Of QR Code Hacking - QR codes, present for years and widely embraced during COVID-19, offer great benefits. Cybercriminals exploit them, creating malicious QR codes to unlawfully access your personal and financial data. These tampered codes pose a threat, potentially ...
1 year ago Cysecurity.news
Why cellular-first SASE is defining the future of distributed enterprises - Startups seeing double-digit growth rates tell VentureBeat that combining networking and security in the same platform is essential for protecting every identity, endpoint, and threat surface that gets exposed as their companies quickly grow. ...
1 year ago Venturebeat.com
Smishing: SMS Phishing Attacks And How to Thwart Them - Smishing is a fast growing version of one of the most established and lucrative scams on the internet. Smishing, like other forms of phishing, aims to trick you into revealing sensitive data and information; however, instead of email, cybercriminals ...
1 year ago Cysecurity.news
New Astaroth 2FA Phishing Kit Targeting Gmail, Yahoo, Office 365, and 3rd-Party Logins - To safeguard against sophisticated phishing attacks like the Astaroth 2FA phishing kit, users should create strong, unique passwords, enable two-factor authentication (2FA) using authenticator apps, and exercise caution when handling links or ...
7 months ago Cybersecuritynews.com
Top Characteristics of a QR Code Phishing Email - As campaigns using QR codes grow in size and complexity it is important to track not just the QR codes themselves, but also the context of the emails delivering the QR codes. Others use images embedded in the email or QR codes rendered from external ...
1 year ago Securityboulevard.com
How to Scan a QR Code On iPhone - The iPhone offers multiple ways of scanning QR codes, but the quickest and easiest method is using its built-in camera app. Open your camera app and point at a QR code; a notification will appear in the lower-right corner of the screen. Follow the QR ...
1 year ago Hackercombat.com
Mandiant says X account brute forced without 2FA protection The Register - Well, Mandiant's carefully worded response basically said it wasn't implemented. It didn't specifically point to the policy change X announced in February 2023, which was to disable SMS-based 2FA for users who didn't pay for Twitter Blue, but some ...
1 year ago Go.theregister.com
Salty2FA Phishing Kit Targets 2FA Codes to Bypass Security - The Salty2FA phishing kit is a new threat targeting two-factor authentication (2FA) codes to bypass enhanced security measures. This phishing kit is designed to steal 2FA tokens, allowing attackers to gain unauthorized access to accounts that rely on ...
4 weeks ago Infosecurity-magazine.com
Twilio will ditch its Authy desktop 2FA app in August, goes mobile only - The Authy desktop apps for Windows, macOS, and Linux will be discontinued in August 2024, with the company recommending users switch to a mobile version of the two-factor authentication app. Authy is an authenticator app that allows users to set up ...
1 year ago Bleepingcomputer.com
"Sierra:21" vulnerabilities impact critical infrastructure routers - A set of 21 newly discovered vulnerabilities impact Sierra OT/IoT routers and threaten critical infrastructure with remote code execution, unauthorized access, cross-site scripting, authentication bypass, and denial of service attacks. The flaws ...
1 year ago Bleepingcomputer.com
Threat Actors Leveraging Toll Payment Services in Massive Hacking Attack - The attackers have demonstrated remarkable sophistication in their ability to spoof official toll service communications, making it exceptionally difficult for average consumers to distinguish between legitimate messages and fraudulent ones. At the ...
6 months ago Cybersecuritynews.com
2FA-less GitLab users vulnerable to account takeovers The Register - GitLab admins should apply the latest batch of security patches pronto given the new critical account-bypass vulnerability just disclosed. Tracked as CVE-2023-7028, the maximum-severity bug exploits a change introduced in version 16.1.0 back in May ...
1 year ago Go.theregister.com CVE-2023-7028 CVE-2023-5356 CVE-2023-4812 CVE-2023-6955 CVE-2023-2030
QR Codes Used in 22% of Phishing Attacks - The Hoxhunt Challenge has unveiled alarming trends in employee susceptibility to phishing attacks, emphasizing the critical role of engagement in reducing human risk. The study, published today and conducted in 38 organizations across nine industries ...
1 year ago Infosecurity-magazine.com
Sophos Intercept X for Windows Vulnerabilities Enable Arbitrary Code Execution - The registry ACL vulnerability CVE-2024-13972 impacts all Intercept X for Windows installations prior to version 2024.3.2, as well as Fixed Term Support (FTS) 2024.3.2.23.2 and Long Term Support (LTS) 2025.0.1.1.2 releases. Identified as ...
2 months ago Cybersecuritynews.com CVE-2024-13972
QR Code Scammers are Changing Tactics to Evade Detection - Check Point researchers last year saw a 587% increase between August and September of phishing attacks enticing unsuspecting targets to click on QR codes that then redirect them to malicious pages used for harvesting credentials. The cybersecurity ...
1 year ago Securityboulevard.com
GitHub Wants All Users to Enable 2FA Before the End of 2023 - GitHub, the omnipresent nexus for developers and their code, has embarked on a decisive initiative aimed at fortifying the security of the software supply chain. In a groundbreaking announcement, the platform has set forth a mandate for two-factor ...
1 year ago Cybersecuritynews.com
DrayTek Routers at Risk From 14 New Vulnerabilities - The advice comes amid signs of growing threat actor activity — including by nation-state actors — targeting vulnerabilities in routers and other network devices from DrayTek and a variety of other vendors, including Fortinet, F5, QNAP, Ivanti, ...
1 year ago Darkreading.com CVE-2024-41592 CVE-2024-41585 CVE-2021-20123 CVE-2021-20124
Award-Winning Centralized Platform Helps Unlock Value Through Simplicity - Network operators need to cater to their customers by delivering services from anywhere between 1G to 100G speeds, while having the ability to aggregate into 400G networks. With the evolution of the network and emergence of more localized and ...
1 year ago Feedpress.me
Post-quantum cryptography: Code-based cryptography - One option is to use error correction codes as a cryptographic primitive. The basics Error correction codes are digital codes used to reliably send data through an unreliable channel. In a noisy channel, corruption of some of the bits would yield an ...
1 year ago Redhat.com

Cyber Trends (last 7 days)