Trablog
  • Home
  • LifeStyle
  • Gaming
  • Sport
  • Food
  • Travel
  • Fashion
  • Technology
  • Economy
Thursday, January 22, 2026
No Result
View All Result
  • Home
  • LifeStyle
  • Gaming
  • Sport
  • Food
  • Travel
  • Fashion
  • Technology
  • Economy
No Result
View All Result
Trablog
No Result
View All Result
Home Technology

Millions of people imperiled through sign-in links sent by SMS

January 21, 2026
in Technology
0

Digital generated image of abstract smartphone stylized as mousetrap surrounded by multicoloured social message chat icons.

0
SHARES
0
VIEWS
Share on FacebookShare on Twitter

Story text

* Subscribers only
  Learn more

Websites that authenticate users through links and codes sent in text messages are imperiling the privacy of millions of people, leaving them vulnerable to scams, identity theft, and other crimes, recently published research has found.

The links are sent to people seeking a range of services, including those offering insurance quotes, job listings, and referrals for pet sitters and tutors. To eliminate the hassle of collecting usernames and passwords—and for users to create and enter them—many such services instead require users to provide a cell phone number when signing up for an account. The services then send authentication links or passcodes by SMS when the users want to log in.

Easy to execute at scale

A paper published last week has found more than 700 endpoints delivering such texts on behalf of more than 175 services that put user security and privacy at risk. One practice that jeopardizes users is the use of links that are easily enumerated, meaning scammers can guess them by simply modifying the security token, which usually appears at the right of a URL. By incrementing or randomly guessing the token—for instance, by first changing 123 to 124 or ABC to ABD and so on—the researchers were able to access accounts belonging to other users. From there, the researchers could view personal details, such as partially completed insurance applications.

In other cases, the researchers could have transacted sensitive business while masquerading as the other user. Other links used so few possible token combinations that they were easy to brute force. Other examples of shoddy practices were links that allowed attackers who gained unauthorized access to access or modify user data with no other authentication other than clicking on a link sent by SMS. Many of the links provide account access for years after they were sent, further raising the risk of unauthorized access.

“We argue that these attacks are straightforward to test, verify, and execute at scale,” the researchers, from the universities of New Mexico, Arizona, Louisiana, and the firm Circle, wrote. “The threat model can be realized using consumer-grade hardware and only basic to intermediate Web security knowledge.”

SMS messages are sent unencrypted. In past years, researchers have unearthed public databases of previously sent texts that contained authentication links and private details, including people’s names and addresses. One such discovery, from 2019, included millions of stored sent and received text messages over the years between a single business and its customers. It included usernames and passwords, university finance applications, and marketing messages with discount codes and job alerts.

Despite the known insecurity, the practice continues to flourish. For ethical reasons, the researchers behind the study had no way to capture its true scale, because it would require bypassing access controls, however weak they were. As a lens offering only a limited view into the process, the researchers viewed public SMS gateways. These are typically ad-based websites that let people use a temporary number to receive texts without revealing their phone number. Examples of such gateways are here and here.

With such a limited view of SMS-sent authentication messages, the researchers were unable to measure the true scope of the practice and the security and privacy risks it posed. Still, their findings were notable.

The researchers collected 322,949 unique SMS-delivered URLs extracted from over 33 million texts, sent to more than 30,000 phone numbers. The researchers found numerous evidence of security and privacy threats to the people receiving them. Of those, the researchers said, messages originating from 701 endpoints sent on behalf of the 177 services exposed “critical personally identifiable information.” The root cause of the exposure was weak authentication based on tokenized links for verification. Anyone with the link could then obtain users’ personal information—including Social Security numbers, dates of birth, bank account numbers, and credit scores—from these services.

Of the 701 services, 125 allowed “mass enumeration of valid URLs due to low entropy.” Attackers who had received links from the same service could then easily modify the tokens they had to access other people’s accounts.

Because of the limited view into the practice, these numbers likely significantly undercount the true number of services jeopardizing users’ security and privacy by sending such links.

The likely widespread sending of unsafe links in SMS messages means there are few concrete steps most people can take to protect themselves. Stepping back and assessing the weak authentication processes in general, Muhammad Danish, the lead author of the paper, wrote in an email:

The root causes we found are related to service providers and the burden is on them. We can say users should not give sensitive details to untrusted sources, but that suggestion fails in our case as our list includes even well-established service providers with millions of active users. Users can help us by reporting to the service providers or removing their data until fixed if they see any of these issues in a website.

Examples of the offending services can be found in the paper linked above.

The practice is popular because it imposes lower perceived friction on potential customers. Another benefit is that endpoints don’t have to collect and store usernames and passwords, which have proven over and over to be easily stolen by hackers. Another reason they’re used is the false assumption by the people setting up the service that such links will restrict all others than those who sent the text and endpoint misconfigurations or lack of security reviews of them.

Muhammad, like other security professionals, said authentication links sent by SMS or email aren’t automatically unsafe as long as links are short lived, expire after the first login, and have a cryptographically secure token. Privacy-minded sites, including DuckDuckGo and 404 Media, have opted to authenticate users with a “magic link” that’s sent to an account holder’s email address.

“By not creating a password with us you have no risk of it leaking, and we don’t have to deal with the responsibility of keeping it secure, 404 Media editors wrote. “The sign in link is going to your email, which presumably is protected with two-factor authentication, if you have it set up (which you should!).” Many people who object to the use of magic links fail to realize that many services that require a password already fall back to the equivalent of magic links for account recovery.

To be safe, magic links must be time-limited to lessen the chances of them being used by others. 404 Media says that links expire within 24 hours. DuckDuckGo’s authentication email system works differently. It sends a long one-time password. It’s unclear how long the passcode remains valid.

Magic links also aren’t suitable for sites like Gmail, Office365, or banks that store large amounts of user data and must rely on robust account recovery mechanisms.

Another way to strengthen the security of SMS- or email-based authentication is to require a second factor, in addition to the link sent, although a birthdate, zip code, or other low-entropy factor is insufficient. Further, login attempts must be rate-limited to prevent an attacker from making attempt after attempt until arriving at the right one.

For now, people should recognize that many of the SMS-delivered authentication links they receive may be exposing their sensitive data, and this practice isn’t likely to change soon. Of the 150 affected service providers the researchers were able to contact, only 18 responded and only seven have fixed the failure.

Photo of Dan Goodin

Dan Goodin Senior Security Editor

Dan Goodin Senior Security Editor

Originally published at Ars Technica

Tags: artificial-intelligencebitcoincryptocurrencyfinancetechnology
Previous Post

Lifehacker Deals Live Blog: The Best Tech Sales, All in One Place

Next Post

Judge orders stop to FBI search of devices seized from Washington Post reporter

Next Post

Judge orders stop to FBI search of devices seized from Washington Post reporter

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

A Nostalgic Journey: Exploring the Iconic Fashion Trends of the 90s

A Nostalgic Journey: Exploring the Iconic Fashion Trends of the 90s

March 28, 2024
Fernandes Inspires Manchester United to Victory in Dramatic Clash with Sheffield United

Fernandes Inspires Manchester United to Victory in Dramatic Clash with Sheffield United

April 25, 2024
Exploring the Future: Apple’s New VR Glasses

Exploring the Future: Apple’s New VR Glasses

March 10, 2024
Nuggets Journal: Colorado Native Derrick White, Point Guard for the Celtics, Continues to Struggle to Reserve a Table at Casa Bonita

Nuggets Journal: Colorado Native Derrick White, Point Guard for the Celtics, Continues to Struggle to Reserve a Table at Casa Bonita

January 25, 2024

MLB offseason grades: Mets get their ace in blockbuster deal for Peralta

January 22, 2026

Sources: Bucs stay in South, tab Robinson as OC

January 22, 2026

Threads rolls out ads to all users worldwide

January 21, 2026

Overwatch 2 Fans React to Cowboy Bebop Collaboration, Question Cassidy’s Spike Spiegel Skin

April 16, 2024

Netflix is rolling out a live voting feature

January 20, 2026

Sportmax Pre-Fall 2026

January 22, 2026

Campaign Initiated by Spider-Man Enthusiasts to Preserve the Integrity of the Spider-Verse

March 12, 2024

Navigating a Relationship When Desire Fades

April 4, 2024

Unveiled: The Unreleased Spider-Man Multiplayer Game by Insomniac

April 21, 2024

The Pros and Cons of Gaming Online with Friends vs. Playing Solo

January 14, 2024

Indiana repeat? Georgia back on top? Hawai’i in? Who could be in the 2026 CFP

January 22, 2026

Lifehacker Deals Live Blog: The Best Tech Sales, All in One Place

January 21, 2026

Categories

  • Economy
  • Fashion
  • Food
  • Gaming
  • LifeStyle
  • Sport
  • Technology
  • Travel

Recent News

Sportmax Pre-Fall 2026

January 22, 2026

Anthropic has to keep revising its technical interview test so you can’t cheat on it with Claude

January 22, 2026
  • Imprint

© 2024 trablog.

No Result
View All Result
  • Home
  • Lifestyle
    • Fashion
    • Food
    • Travel

© 2024 trablog.