WATCH: This hacker shows how to beat two-factor authentication

A security researcher, Chief Hacking Officer of company KnowBe4 Kevin Mitnick has developed a social engineering attack to breach two-factor authentication, TechCrunch reported.

In a public video, Mitnick produced a video on YouTube showing how the exploit works by sending victims to a fake login page.

The site requests your username, password, and authentication code, which it passes to the legitimate site to log you in, while capturing the session cookie in the process.

This is known as a phishing attack.

What is a phishing attack?

Phishing is the attempt of a hacker to obtain sensitive and personal information such as usernames, passwords, and credit card details, often for malicious reasons. 

Once this is done, the hacker can log in whenever they want, according to the report.

While the attack was demonstrated on LinkedIn, Mitnick’s company KnowBe4 warned that the attack could be weaponised for any site.

Additionally, Stu Sjouwerman, CEO of KnowBe4 told TechCrunch that anti-phishing education is deeply important and that a hack like this is impossible to complete if the victim is savvy about security and the dangers of clicking links that come into your email box.


In other hacker news, The Business Report team tested a tutorial earlier this year that was shown by a young female whose video received over 1,7 million views showing how she hacked her boyfriend's WhatsApp 

We tested the hacking process on both Android and Apple devices and the hack worked on both systems with relative ease.

It is worth noting that the video was first posted on Facebook 11 months ago, and yet there seem to be no security measures implemented by WhatsApp to prevent or notify this relatively easy hacking process.

For the original article and more fantastic tech news refer to the source.

Source: BusinessReport

Topics: Social Engineering, session cookie capture, Speaking Engagements, two factor authentication breach, Chief Hacking Officer, KnowBe4, Stu Sjuwerman, phishing, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

Bypassing Key Card Access: Shoring Up Your Physical Security

As you build additional layers of defense into your cybersecurity framework, it's important to implement physical security strategies as well.

Read more ›

How to Prioritize Your Pentesting Report’s Remediation Recommendations

If you recently received a penetration test, you’re on the right track to improving your cybersecurity posture. However, you may be wondering what the..

Read more ›

Understanding Post-Inoculation Cybersecurity Attack Vectors

If you’ve recently improved your cybersecurity posture, you should know that the work to protect your company’s data is not over.

Read more ›