Book an Appointment

Y-Not Tech Services Logo
  • Home
  • About
  • Contact
  • Services
    • Done-For-You Busienss IT Services
    • Business Continuity and Disaster Recovery
    • Home Security Suite
    • Password Protector
    • All Services
  • Best Antivirus
  • Articles
    • Browse All
    • What Happens When You Interrupt a Windows Update? | Y-Not Tech Services – Lethbridge, AB Computer Help
    • Do You Know Exactly What is Being Backed Up on Your Computer? – Y-Not Tech Services | Lethbridge, AB IT Business
    • 6 Reasons to Replace Your ISP Email | Y-Not Tech Services – Lethbridge, AB Computer Help
    • 6 Uses for Your Old, Extra Computers | Y-Not Tech Services – Lethbridge, AB Computer Help
    • A Friend of Mine Was the Victim of Bank Fraud in Lethbridge, AB
    • Avoid Duplicating Passwords | Y-Not Tech Services – Lethbridge, AB Computer Repair
  • Testimonials
  • Hours
  • Remote

How Hackers Get Around SMS Two-Factor Authentication (2FA) | Y-Not Tech Services – Lethbridge, AB Computer Help

November 30, 2021 by Tony Whitney

How Hackers Get Around SMS Two-Factor Authentication (2FA) | Y-Not Tech Services - Lethbridge, AB Computer HelpHow Hackers Get Around SMS Two-Factor Authentication

Every time you’re online and a site sends a separate code to check your identity, you’re using two-factor authentication. It’s become the norm. So, of course, hackers have figured out how to get around this, too. This article shows you how they do it and how to stay safe.

With billions of usernames and passwords leaked, access credentials everywhere are at risk, especially if you are reusing your log-in information on more than one site (don’t do it!).

Business websites want to offer a secure user experience, so two-factor authentication (2FA) has become the norm. It’s meant to help stop automated attacks in which bad actors use the leaked usernames and passwords.

Still, if the site you’re visiting uses short message service (SMS/Cell Phone Texts) to send a one-time code to your phone, you could still be at risk.

Hackers, using information they have from a data leak, can call your telephone company. They use your name, date of birth, and other identifiers available on the Dark Web, to impersonate you. Then, say you’ve lost your phone, they transfer your phone number to a device with a different SIM card.

That means when the one-time SMS code gets sent to your phone number, the message will instead go to their device.

Android Users Also Beware

On Android devices, hackers have an easier time getting access to text messages. If they have access to your leaked Google credentials, they can log into your Google Play account. From there, it’s simply a matter of installing a message-mirroring app on your smartphone.

The app synchronizes notifications across your different devices. It’s for when you really need to be connected, and you’ll be able to see your phone’s SMS alerts on your tablet!

The app won’t work unless you give it permission when prompted to do so, but too many people don’t stop to read alerts from their own accounts: they assume it’s another necessary update and go on with their day. Otherwise, the hacker might call you in a social engineering ploy pretending to be a legit service provider. They’ll be familiar with you, so you’re more likely to listen when they ask you to give permission.

Again, when the one-time SMS code gets sent to your phone, the hacker’s device will also receive the code because of the message-mirroring app.

What Can You Do to Protect Yourself?

It starts with using unique passwords for all sites you visit. Worried you’ll forget them? A password manager can keep all your access credentials in one secure place for you.

You should also confirm that your credentials haven’t been compromised. If you use Google’s password service, you can head to the password manager site and tap “check passwords” to see if there are any issues. On Firefox, head to the Firefox Monitor page and “Check for Breaches.” On Safari, click on Preferences, and then on Passwords to see what recommendations they have for your security.

Change any passwords that have been involved in a leak!

To avoid the SMS concern specifically, avoid using one-time SMS codes to verify your identity. Instead, you can use a non-SMS authentication tool such as Google authenticator, which provides two-step verification services within the app itself.

Need help learning if your credentials have been leaked? Or want assistance setting up more security for your online activity? We can help. Book an appointment with our IT experts today.

Book an Appointment

 

Filed Under: Lesson Tagged With: 2fa, Computer help, computer help lethbridge, computer repair, computer repair Lethbridge, cybersecurity, cyberthreats, onlinethreat, securitytips, Y-Not, y-not tech, ynot, ynot tech

Share:

Services

  • Web Design and Hosting
  • Upgrade to Solid State Drive
  • Laptop Screen Replacement
  • Virus Removal and Tuneup
  • Software Installation
  • Remote Connection Tech Support for Canada
  • On Site Service
  • One on One Technology Training
  • Hardware Install
  • Computer Diagnostic

Testimonials

  • Tony is knowledgeable, friendly and efficient. Read More
    Bruce W.
  • Tony was great to do business with. He knew exactly what needed to be done even with the little amount of information I had about the project!!! Competitive pricing I will definitely call him again!! Read More
    Graham F.
  • Very friendly, personable and present when explaining what is going on with the computer, appreciated a good dialogue and helpfulness you provided! Read More
    Darlene B.
    Lethbridge, AB
  • Tony is the best IT computer guy I have ever used, he has fixed problems the big guys said I had to buy a new computer for and then I got him to set up internet stuff for the house...again awesome and someone I trust. (from google.com) Read More
    David Duggan
  • Y-Not Tech Services is a excellent tech company that answers all your questions regarding computer problems. Tony is completely honest in explaining options to deal with the problem, and then recommends the best option to use. His advice is based on not just his own consensus, but as well checks with other techs in his... Read More
    Derrick Boyko
    Coaldale, AB
  • Tony walked in to drop off a business card and when he walked out. 3 issues I had on my computer were gone and I had a new anti virus. Phenomenal service I would recommend him to anyone ! (from facebook.com/ynottechservices) Read More
    Ryan Brigham
    Big Al's Music and Games in Lethbridge, AB
  • I trust my tech guy! ... (it's Tony) best option if you don't watch your scans and security. Read More
    Kehly Rath
  • Will recommend to anybody. He is darn good. Read More
    Shima Raj
  • He is fast to respond and has always been able to walk me through any problem I have. I always rely on Tony for my tech needs. Read More
    Heather Arstall
  • Will always recommend the best product or service to fit your unique needs. Read More
    Bev Trahan
Get Your Free Ebook

FOLLOW US

Book an Appointment with us!

Book an Appointment

Copyright © 2025 · Y-Not Tech Services · 534 17 st S, Lethbridge, Alberta (AB) T1J 3C3