Skip to Main Content
PCMag editors select and review products independently. If you buy through affiliate links, we may earn commissions, which help support our testing.

How to Hack Twitter's Two-Factor Authentication

Experts say Twitter's two-factor authentication won't stop hackers. Worse, hackers could well take over your account's two-factor authentication and thereby lock you out.

By Neil J. Rubenking
Updated May 24, 2013
How To Hack Twitter's Two-Factor Authentication

How To Hack Twitters Two-Factor AuthenticationWe've pointed out some problems with Twitter's new two-factor authentication. For example, since just one phone number can be associated with an account, Twitter's two-factor authentication won't work for organizations like the Associated Press, The Onion, or The Guardian. They were hacked; they could still be hacked again in the same way. However, security experts indicate that the problem is worse than that, a lot worse.

Twitter's Two-Step Program
Ask Josh Alexander, CEO of authentication company Toopher, how you'd go about hacking Twitter now that two-factor authentication is in place. He'll tell you that you do it exactly the same way you did before the advent of two-factor authentication.

In a short, droll video about Twitter's two-factor authentication, Alexander congratulates Twitter for joining a "security two-step program" and taking the first step, admitting a problem exists. He then goes on to illustrate just how little the SMS-based two-factor authentication helps. "Your new solution leaves the door wide open," said Alexander, "for the same man-in-the-middle attacks that compromised the reputations of major news sources and celebrities."

The process starts with a hacker sending a convincing email, a message advising me to change my Twitter password, with a link to a fake Twitter site. Once I do, the hacker uses my captured login credentials to connect with the real Twitter. Twitter sends me a verification code and I enter it, thereby giving it to the hacker. At this point the account is pwned. Watch the video—it shows the process very clearly.

It comes as no surprise that Toopher offers a different kind of smartphone-based two-factor authentication. The Toopher solution keeps track of your usual locations and usual activities, and can be set to automatically approve usual transactions. Instead of texting you a code to complete a transaction, it sends a push notification with details of the transaction including the username, the site, and the compute involved. I haven't tested it, but it looks sensible.

Avoid Two-Factor Takeover
Security rockstar Mikko Hypponnen of F-Secure posits an even more dire scenario. If you haven't enabled two-factor authentication, a malefactor who gains access to your account could set it up for you, using his own phone.

In a blog post, Hypponen points out that if you ever send tweets via SMS, you already have a phone number associated with your account. It's easy to halt that association; simply text STOP to the Twitter short code for your country. Note, though, that doing so also halts two-factor authentication. Sending GO turns it on again.

With this in mind, Hypponen posits a scary sequence of events. First, the hacker gets access to your account, perhaps via a spear phishing message. Then, by texting GO from his own phone to the appropriate short code and following a few prompts, he configures your account so that the two-factor authentication code comes to his phone. You're locked out.

This technique won't work if you've already enabled two-factor authentication. "Perhaps you should enable your account's 2FA," suggested Hypponen, "before somebody else does it for you." It's not entirely clear to me why the attacker couldn't first use SMS spoofing to STOP two-factor authentication and then proceed with the attack. Could I be more paranoid than Mikko?

Like What You're Reading?

Sign up for SecurityWatch newsletter for our top privacy and security stories delivered right to your inbox.

This newsletter may contain advertising, deals, or affiliate links. Subscribing to a newsletter indicates your consent to our Terms of Use and Privacy Policy. You may unsubscribe from the newsletters at any time.


Thanks for signing up!

Your subscription has been confirmed. Keep an eye on your inbox!

Sign up for other newsletters

TRENDING

About Neil J. Rubenking

Lead Analyst for Security

When the IBM PC was new, I served as the president of the San Francisco PC User Group for three years. That’s how I met PCMag’s editorial team, who brought me on board in 1986. In the years since that fateful meeting, I’ve become PCMag’s expert on security, privacy, and identity protection, putting antivirus tools, security suites, and all kinds of security software through their paces.

Before my current security gig, I supplied PCMag readers with tips and solutions on using popular applications, operating systems, and programming languages in my "User to User" and "Ask Neil" columns, which began in 1990 and ran for almost 20 years. Along the way I wrote more than 40 utility articles, as well as Delphi Programming for Dummies and six other books covering DOS, Windows, and programming. I also reviewed thousands of products of all kinds, ranging from early Sierra Online adventure games to AOL’s precursor Q-Link.

In the early 2000s I turned my focus to security and the growing antivirus industry. After years working with antivirus, I’m known throughout the security industry as an expert on evaluating antivirus tools. I serve as an advisory board member for the Anti-Malware Testing Standards Organization (AMTSO), an international nonprofit group dedicated to coordinating and improving testing of anti-malware solutions.

Read Neil J.'s full bio

Read the latest from Neil J. Rubenking