Search This Blog

Powered by Blogger.

Blog Archive

Labels

About Me

Showing posts with label online account protection. Show all posts

Coinbase Fixes Account Log Bug That Mistakenly Triggered 2FA Breach Alerts

 

Coinbase has resolved a logging issue in its system that led users to wrongly believe their accounts had been compromised, after failed login attempts were mistakenly labeled as two-factor authentication (2FA) failures. As first uncovered by BleepingComputer, the bug caused the platform to misreport login errors. Specifically, attempts made with incorrect passwords were incorrectly shown in the user activity log as “second_factor_failure” or “2-step verification failed.” 

This mislabeling gave the false impression that an attacker had entered the correct password but was blocked at the 2FA stage, which naturally raised alarm among Coinbase users. Several customers reached out to BleepingComputer, expressing concern that their accounts might have been breached. Many reported using unique passwords exclusively for Coinbase, found no signs of malware on their devices, and noticed no other suspicious account activity—adding to their confusion. Coinbase later confirmed the issue, clarifying that attackers had never made it past the password stage. 

The system had mistakenly classified these failed attempts as 2FA errors, even though the second authentication factor was never triggered. To correct the confusion, Coinbase issued an update that now properly logs such attempts as “Password attempt failed” in the account activity logs, removing any misleading implication of a 2FA failure. Such inaccuracies, while seemingly minor, can trigger unnecessary panic. Some affected users reset all their passwords and spent hours scanning their systems for threats—precautions prompted solely by the misleading logs. 

Security experts also warn that errors like this can become tools for social engineering. Misleading logs could be exploited by attackers to trick users into thinking their credentials had been stolen, potentially coercing them into revealing more information or clicking malicious links. Coinbase customers are frequently targeted in phishing and social engineering campaigns. These attacks often involve SMS messages or spoofed phone calls designed to trick victims into giving up 2FA tokens or login details.  

While there is no confirmed case of the mislabeled logs being used in such scams, BleepingComputer noted that some users had reported it. Regardless, Coinbase reiterated that it never contacts customers via phone or text to request password changes or 2FA resets. Any such communication should be treated as a scam attempt.

Phishing Campaign Targets Instagram Users, Steals Backup Codes and Circumvent 2FA Protection

 

A recent phishing scheme has emerged, posing as a 'copyright infringement' email to deceive Instagram users and pilfer their backup codes. These codes, integral for the recovery of accounts, are used to circumvent the two-factor authentication safeguarding users' accounts.

Two-factor authentication is a security layer demanding an extra form of verification during login. This commonly involves one-time passcodes sent via SMS, codes from authentication apps, or hardware security keys. Employing 2FA is crucial in shielding accounts in the event of compromised credentials, requiring a threat actor to access the user's mobile device or email to gain entry.

Instagram, when enabling 2FA, provides eight-digit backup codes as a fail-safe for scenarios like changing phone numbers, losing a device, or email access. However, these backup codes pose a risk if obtained by malicious actors, enabling them to seize Instagram accounts using unauthorized devices by exploiting the user's credentials, acquired through phishing or unrelated data breaches.

The phishing tactic involves sending messages alleging copyright infringement, claiming the user violated intellectual property laws, resulting in account restrictions. Users are then prompted to click a button to appeal, leading them to phishing pages where they unwittingly provide account credentials and other information.

Trustwave analysts discovered the latest iteration of this attack, where phishing emails mimic Meta, Instagram's parent company. The deceptive email warns users of copyright infringement complaints and urges them to fill out an appeal form to address the issue. Clicking on the provided button redirects the victim to a fake Meta violations portal, where they are prompted to click another button, purportedly for confirming their account.

This second click redirects to another phishing page resembling Meta's "Appeal Center" portal, prompting victims to input their username and password twice. After acquiring these details, the phishing site requests confirmation of 2FA protection and, upon affirmation, demands the 8-digit backup code.

Despite identifiable signs of fraud, such as misleading sender addresses and URLs, the convincing design and urgency of the phishing pages could still deceive a significant number of targets into divulging their account credentials and backup codes.

The importance of safeguarding backup codes is emphasized, with users advised to treat them with the same level of confidentiality as passwords. It is emphasized that there is never a legitimate reason to enter backup codes anywhere other than the official Instagram website or app, as a precaution against falling victim to such phishing campaigns.