{"id":19428,"date":"2021-09-30T21:21:17","date_gmt":"2021-09-30T21:21:17","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=19428"},"modified":"2021-09-30T21:21:17","modified_gmt":"2021-09-30T21:21:17","slug":"attackers-use-bots-to-circumvent-one-time-passwords","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/attackers-use-bots-to-circumvent-one-time-passwords\/","title":{"rendered":"Attackers Use Bots to Circumvent Some Two-Factor Authentication Systems"},"content":{"rendered":"<p>Underground services are cropping up that are designed to enable bad actors to intercept one-time passwords (OTPs), which are widely used in <a href=\"https:\/\/www.esecurityplanet.com\/mobile\/multi-factor-authentication\/\">two-factor authentication<\/a> programs whose purpose is to better protect customers\u2019 online accounts.<\/p>\n<p>By using the services, cybercriminals can gain access to victims\u2019 accounts to steal money. Security expert Chris Krebs wrote in a <a href=\"https:\/\/krebsonsecurity.com\/2021\/09\/the-rise-of-one-time-password-interception-bots\/\" target=\"_blank\" rel=\"noopener\">blog post<\/a> this week that he discovered such a service \u2013 called OPT Agency \u2013 earlier this year, noting that the service was shut down soon after his report was published.<\/p>\n<p>However, researchers at threat intelligence firm Intel 471 in a <a href=\"https:\/\/intel471.com\/blog\/otp-password-bots-telegram\" target=\"_blank\" rel=\"noopener\">report<\/a> this week said they have seen a rise in these services, enabling attackers to target everything from bank accounts to social media platforms. The services have been operational since June and either operate through a bot on the cloud-based instant messaging system Telegram or by providing support to bad actors via a Telegram channel.<\/p>\n<p>\u201cOver the past few months, we\u2019ve seen actors provide access to services that call victims, appear as a legitimate call from a specific bank and deceive victims into typing an OTP or other verification code into a mobile phone in order to capture and deliver the codes to the operator,\u201d the Intel 471 researchers wrote. \u201cSome services also target other popular social media platforms or financial services, providing email <a href=\"https:\/\/www.esecurityplanet.com\/threats\/email-spoofing\/\">phishing<\/a> and SIM swapping capabilities.\u201d<\/p>\n<h2>OTP Interception Services Emerge<\/h2>\n<p>They added that in the Telegram support channels, bad actors using the services \u201coften share their success while using the bot, often walking away with thousands of dollars from victim accounts.\u201d<\/p>\n<p>A wide range of websites are requiring users to not only type in a <a href=\"https:\/\/www.esecurityplanet.com\/applications\/microsoft-expands-passwordless-sign-on-to-all-accounts\/\">password<\/a> to get onto the site, but also to type in a numeric code or OTP token that is sent via a text message. In addition, Google (with Google Authenticator) and Authy offer mobile apps that generate such numbers and are used by the website and user.<\/p>\n<p>The goal is to strengthen the security of the websites and their customer accounts by adding another layer of protection by requiring the code or OTP token.<\/p>\n<p>However, Intel 471 researchers found that a number of new OTP interception services have emerged over the last few months, with slight differences in the way they work but all with a common endgame. They\u2019re also part of a larger trend toward offering services \u2013 such as <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-as-a-service-raas-ttp-protections\/\">ransomware-as-a-service<\/a> (RaaS) \u2013 that make it easier for even low-skilled cybercriminals to launch attacks.<\/p>\n<p>\u201cThe ease by which attackers can use these bots cannot be understated,\u201d they wrote. \u201cWhile there\u2019s some programming ability needed to create the bots, a bot user only needs to spend money to access the bot, obtain a phone number for a target, and then click a few buttons.\u201d<\/p>\n<h2>Stealing Credentials<\/h2>\n<p>Despite the relative newness of the services, the news of their rise didn\u2019t surprise Brian Uffelman, vice president and security evangelist at cybersecurity firm PerimeterX.<\/p>\n<p>&#8220;Cybercriminals are finding every means possible to leverage weaknesses in human behavior for financial gain,\u201d Uffelman told <em>eSecurity Planet<\/em>. \u201cStolen credentials, like OTPs, can be used for credential stuffing and ATO [account takeover] attacks, which can steal value, whether that is in the form of gift cards, credit card numbers, loyalty points or false purchases. ATO attacks are a major threat to any business and all of this just creates more fuel to feed the ATO attack fire. It is much simpler and lucrative to walk in through the front door of a digital business with valid, stolen credentials than to look for holes in an organization\u2019s cybersecurity defenses.\u201d<\/p>\n<h2>How OTP Bots Work<\/h2>\n<p>Intel 471 researchers said one bot, called SMSRanger, is easy for bad actors to use. They pay for access to the bot and can use it by entering commands similar to those used on Slack\u2019s workforce collaboration tool. Users can enter a simple slash command to enable different scripts aimed at services \u2013 called \u201cmodes\u201d \u2013 that can target specific bands, a wireless carrier and payment apps like PayPal, Apple Pay and Google Pay.<\/p>\n<p>\u201cOnce a target\u2019s phone number has been entered, the bot does the rest of the work, ultimately granting access to whatever account has been targeted,\u201d the researchers wrote. \u201cUsers claim that SMSRanger has an efficacy rate of about 80% if the victim answered the call and the full information (fullz) the user provided was accurate and updated.\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-19429\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2021\/09\/SMSranger-e1633036170669.png\" alt=\"OTP bot\" width=\"550\" height=\"456\" \/><\/p>\n<p>BloodOTPbot, another bot, includes the ability to send victims a fake OTP code through SMS. To do this, an attacker needs to spoof the victim\u2019s phone number and impersonate a bank or company representative and then the bot would try to call the victim, using social engineering techniques to get ahold of a verification code.<\/p>\n<p>\u201cThe [bot\u2019s] operator would receive a notification from the bot during the call specifying when to request the OTP during the authentication process,\u201d they wrote. \u201cThe bot would text the code to the operator once the victim received the OTP and entered it on the phone\u2019s keyboard.\u201d<\/p>\n<p>Attackers using the bot need to pay a $300 monthly fee to obtain the authentication code required to operate the bot. At the same time, they also could pay another $20 to $100 for live phishing panels that target accounts on social media networks like Facebook, Instagram and Snapchat, as well as financial services like PayPal and Venmo, investment app Robinhood and the Coinbase cryptocurrency marketplace.<\/p>\n<p>A third bot, dubbed SMS Buster, is more difficult for bad actors to use. Users are given options for disguising a call so it appears to be a real contact from a specific bank even as attackers dial from any phone number. The caller then follows a script to get the victim to provide sensitive information, like an ATM PIN, OTP and a card verification value (CVV). That can then be sent to a person&#8217;s Telegram account.<\/p>\n<p>SMS Buster has been used against Canadian victims, giving bad actors the ability to launch an attack in English or French. So far, Intel 471 researchers found accounts illegally accessed at eight Canadian-based banks.<\/p>\n<h2>Phishing, Social Engineering are Still Problems<\/h2>\n<p>The methods of attack may be relatively new, but they rely on the time-tested practice of social engineering, according to Nicolas Malbranche, senior product manager at ID management company Axiad.<\/p>\n<p>&#8220;At the core of this issue is <a href=\"https:\/\/www.esecurityplanet.com\/threats\/salesforce-email-service-used-for-phishing-campaign\/\">phishing<\/a>, showing yet again how phishing threats are on the rise,\u201d Malbranche told <em>eSecurity Planet<\/em>. \u201cEven if your organization is up to date with the latest <a href=\"https:\/\/www.esecurityplanet.com\/products\/antivirus-software\/\">anti-malware software<\/a>, it\u2019s impossible to protect your employees from every potential business email compromise like this. That&#8217;s why it&#8217;s important to prioritize <a href=\"https:\/\/www.esecurityplanet.com\/products\/cybersecurity-training\/\">security training<\/a> for all your employees and teach them best practices on how to spot and report phishing. Without employee education, issues like this will continue to impact businesses.&#8221;<\/p>\n<p>The bot services also illustrate how some forms of two-factor authentication can still carry risks, the Intel 471 researchers wrote.<\/p>\n<p>\u201cWhile SMS- and phone-call-based OTP services are better than nothing, criminals have found ways to socially engineer their way around the safeguards,\u201d they wrote. \u201cMore robust forms of 2FA \u2014 including Time-Based One Time Password (TOTP) codes from authentication apps, push-notification-based codes or a FIDO security key \u2014 provide a greater degree of security than SMS or phone-call-based options.\u201d<\/p>\n<p>Further reading:<\/p>\n<p><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-ransomware-removal-tools\/\">Best Ransomware Removal Tools<\/a><\/p>\n<p><a href=\"https:\/\/www.esecurityplanet.com\/products\/antivirus-software\/\">Best Antivirus Software<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6f992a6d15-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6f992a6d15\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6f992a6d15\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6f992a6d15\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6f992a6d15\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6f992a6d15\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6f992a6d15\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Underground services are cropping up that are designed to enable bad actors to intercept one-time passwords (OTPs), which are widely used in two-factor authentication programs whose purpose is to better protect customers\u2019 online accounts. By using the services, cybercriminals can gain access to victims\u2019 accounts to steal money. Security expert Chris Krebs wrote in a [&hellip;]<\/p>\n","protected":false},"author":256,"featured_media":19429,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[7253],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[31781,31789],"class_list":["post-19428","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-multi-factor-authentication","b2b_audience-awareness-and-consideration","b2b_product-multi-factor-access-management","b2b_product-phishing-and-spear-phishing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Attackers Use Bots to Circumvent Some Two-Factor Authentication Systems | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"One-time passwords (OTPs) were meant to protect accounts. Now they&#039;re being intercepted by hackers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/attackers-use-bots-to-circumvent-one-time-passwords\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Attackers Use Bots to Circumvent Some Two-Factor Authentication Systems | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"One-time passwords (OTPs) were meant to protect accounts. Now they&#039;re being intercepted by hackers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/attackers-use-bots-to-circumvent-one-time-passwords\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-30T21:21:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/SMSranger-e1633036170669.png\" \/>\n\t<meta property=\"og:image:width\" content=\"550\" \/>\n\t<meta property=\"og:image:height\" content=\"456\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jeff Burt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Burt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/attackers-use-bots-to-circumvent-one-time-passwords\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/attackers-use-bots-to-circumvent-one-time-passwords\/\"},\"author\":{\"name\":\"Jeff Burt\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e\"},\"headline\":\"Attackers Use Bots to Circumvent Some Two-Factor Authentication Systems\",\"datePublished\":\"2021-09-30T21:21:17+00:00\",\"dateModified\":\"2021-09-30T21:21:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/attackers-use-bots-to-circumvent-one-time-passwords\/\"},\"wordCount\":1221,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/attackers-use-bots-to-circumvent-one-time-passwords\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/SMSranger-e1633036170669.png\",\"keywords\":[\"multi-factor authentication\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/attackers-use-bots-to-circumvent-one-time-passwords\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/attackers-use-bots-to-circumvent-one-time-passwords\/\",\"name\":\"Attackers Use Bots to Circumvent Some Two-Factor Authentication Systems | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/attackers-use-bots-to-circumvent-one-time-passwords\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/attackers-use-bots-to-circumvent-one-time-passwords\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/SMSranger-e1633036170669.png\",\"datePublished\":\"2021-09-30T21:21:17+00:00\",\"dateModified\":\"2021-09-30T21:21:17+00:00\",\"description\":\"One-time passwords (OTPs) were meant to protect accounts. Now they're being intercepted by hackers.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/attackers-use-bots-to-circumvent-one-time-passwords\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/attackers-use-bots-to-circumvent-one-time-passwords\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/attackers-use-bots-to-circumvent-one-time-passwords\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/SMSranger-e1633036170669.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/SMSranger-e1633036170669.png\",\"width\":550,\"height\":456,\"caption\":\"OTP bot\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/attackers-use-bots-to-circumvent-one-time-passwords\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Attackers Use Bots to Circumvent Some Two-Factor Authentication Systems\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e\",\"name\":\"Jeff Burt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg\",\"caption\":\"Jeff Burt\"},\"description\":\"Jeffrey Burt has been a journalist for more than three decades, the last 20-plus years covering technology. During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. A freelance journalist since 2017, his articles have appeared on such sites as eWEEK, eSecurity Planet, Enterprise Networking Planet, Enterprise Storage Forum, The Next Platform, ITPro Today, Channel Futures, Channelnomics, SecurityNow, and Data Breach Today.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jburt\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Attackers Use Bots to Circumvent Some Two-Factor Authentication Systems | eSecurity Planet","description":"One-time passwords (OTPs) were meant to protect accounts. Now they're being intercepted by hackers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/attackers-use-bots-to-circumvent-one-time-passwords\/","og_locale":"en_US","og_type":"article","og_title":"Attackers Use Bots to Circumvent Some Two-Factor Authentication Systems | eSecurity Planet","og_description":"One-time passwords (OTPs) were meant to protect accounts. Now they're being intercepted by hackers.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/attackers-use-bots-to-circumvent-one-time-passwords\/","og_site_name":"eSecurity Planet","article_published_time":"2021-09-30T21:21:17+00:00","og_image":[{"width":550,"height":456,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/SMSranger-e1633036170669.png","type":"image\/png"}],"author":"Jeff Burt","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jeff Burt","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/attackers-use-bots-to-circumvent-one-time-passwords\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/attackers-use-bots-to-circumvent-one-time-passwords\/"},"author":{"name":"Jeff Burt","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e"},"headline":"Attackers Use Bots to Circumvent Some Two-Factor Authentication Systems","datePublished":"2021-09-30T21:21:17+00:00","dateModified":"2021-09-30T21:21:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/attackers-use-bots-to-circumvent-one-time-passwords\/"},"wordCount":1221,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/attackers-use-bots-to-circumvent-one-time-passwords\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/SMSranger-e1633036170669.png","keywords":["multi-factor authentication"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/attackers-use-bots-to-circumvent-one-time-passwords\/","url":"https:\/\/www.esecurityplanet.com\/threats\/attackers-use-bots-to-circumvent-one-time-passwords\/","name":"Attackers Use Bots to Circumvent Some Two-Factor Authentication Systems | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/attackers-use-bots-to-circumvent-one-time-passwords\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/attackers-use-bots-to-circumvent-one-time-passwords\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/SMSranger-e1633036170669.png","datePublished":"2021-09-30T21:21:17+00:00","dateModified":"2021-09-30T21:21:17+00:00","description":"One-time passwords (OTPs) were meant to protect accounts. Now they're being intercepted by hackers.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/attackers-use-bots-to-circumvent-one-time-passwords\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/attackers-use-bots-to-circumvent-one-time-passwords\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/attackers-use-bots-to-circumvent-one-time-passwords\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/SMSranger-e1633036170669.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/SMSranger-e1633036170669.png","width":550,"height":456,"caption":"OTP bot"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/attackers-use-bots-to-circumvent-one-time-passwords\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Attackers Use Bots to Circumvent Some Two-Factor Authentication Systems"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e","name":"Jeff Burt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg","caption":"Jeff Burt"},"description":"Jeffrey Burt has been a journalist for more than three decades, the last 20-plus years covering technology. During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. A freelance journalist since 2017, his articles have appeared on such sites as eWEEK, eSecurity Planet, Enterprise Networking Planet, Enterprise Storage Forum, The Next Platform, ITPro Today, Channel Futures, Channelnomics, SecurityNow, and Data Breach Today.","url":"https:\/\/www.esecurityplanet.com\/author\/jburt\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/19428"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/256"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=19428"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/19428\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/19429"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=19428"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=19428"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=19428"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=19428"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=19428"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=19428"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}