
ISC StormCast for Monday, September 19th, 2022
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
00:00
Using Second Factor Tokens to Steal Phones
Dde was able to pull the hexesimal part out with one of his famous tools and convert it to a binary file. Stealing phones for their value as second factor has become a big deal. Some users will allow these messages to be displayed on their lock screen. According to b b c, this weakness has now been exploited in large numbers by thieves who are stealing phones from gim lockers.
Transcript
Play full episode