Trablog
  • Home
  • LifeStyle
  • Gaming
  • Sport
  • Food
  • Travel
  • Fashion
  • Technology
  • Economy
Monday, March 9, 2026
No Result
View All Result
  • Home
  • LifeStyle
  • Gaming
  • Sport
  • Food
  • Travel
  • Fashion
  • Technology
  • Economy
No Result
View All Result
Trablog
No Result
View All Result
Home Technology

Millions of people imperiled through sign-in links sent by SMS

January 21, 2026
in Technology
0

Digital generated image of abstract smartphone stylized as mousetrap surrounded by multicoloured social message chat icons.

0
SHARES
0
VIEWS
Share on FacebookShare on Twitter

Story text

* Subscribers only
  Learn more

Websites that authenticate users through links and codes sent in text messages are imperiling the privacy of millions of people, leaving them vulnerable to scams, identity theft, and other crimes, recently published research has found.

The links are sent to people seeking a range of services, including those offering insurance quotes, job listings, and referrals for pet sitters and tutors. To eliminate the hassle of collecting usernames and passwords—and for users to create and enter them—many such services instead require users to provide a cell phone number when signing up for an account. The services then send authentication links or passcodes by SMS when the users want to log in.

Easy to execute at scale

A paper published last week has found more than 700 endpoints delivering such texts on behalf of more than 175 services that put user security and privacy at risk. One practice that jeopardizes users is the use of links that are easily enumerated, meaning scammers can guess them by simply modifying the security token, which usually appears at the right of a URL. By incrementing or randomly guessing the token—for instance, by first changing 123 to 124 or ABC to ABD and so on—the researchers were able to access accounts belonging to other users. From there, the researchers could view personal details, such as partially completed insurance applications.

In other cases, the researchers could have transacted sensitive business while masquerading as the other user. Other links used so few possible token combinations that they were easy to brute force. Other examples of shoddy practices were links that allowed attackers who gained unauthorized access to access or modify user data with no other authentication other than clicking on a link sent by SMS. Many of the links provide account access for years after they were sent, further raising the risk of unauthorized access.

“We argue that these attacks are straightforward to test, verify, and execute at scale,” the researchers, from the universities of New Mexico, Arizona, Louisiana, and the firm Circle, wrote. “The threat model can be realized using consumer-grade hardware and only basic to intermediate Web security knowledge.”

SMS messages are sent unencrypted. In past years, researchers have unearthed public databases of previously sent texts that contained authentication links and private details, including people’s names and addresses. One such discovery, from 2019, included millions of stored sent and received text messages over the years between a single business and its customers. It included usernames and passwords, university finance applications, and marketing messages with discount codes and job alerts.

Despite the known insecurity, the practice continues to flourish. For ethical reasons, the researchers behind the study had no way to capture its true scale, because it would require bypassing access controls, however weak they were. As a lens offering only a limited view into the process, the researchers viewed public SMS gateways. These are typically ad-based websites that let people use a temporary number to receive texts without revealing their phone number. Examples of such gateways are here and here.

With such a limited view of SMS-sent authentication messages, the researchers were unable to measure the true scope of the practice and the security and privacy risks it posed. Still, their findings were notable.

The researchers collected 322,949 unique SMS-delivered URLs extracted from over 33 million texts, sent to more than 30,000 phone numbers. The researchers found numerous evidence of security and privacy threats to the people receiving them. Of those, the researchers said, messages originating from 701 endpoints sent on behalf of the 177 services exposed “critical personally identifiable information.” The root cause of the exposure was weak authentication based on tokenized links for verification. Anyone with the link could then obtain users’ personal information—including Social Security numbers, dates of birth, bank account numbers, and credit scores—from these services.

Of the 701 services, 125 allowed “mass enumeration of valid URLs due to low entropy.” Attackers who had received links from the same service could then easily modify the tokens they had to access other people’s accounts.

Because of the limited view into the practice, these numbers likely significantly undercount the true number of services jeopardizing users’ security and privacy by sending such links.

The likely widespread sending of unsafe links in SMS messages means there are few concrete steps most people can take to protect themselves. Stepping back and assessing the weak authentication processes in general, Muhammad Danish, the lead author of the paper, wrote in an email:

The root causes we found are related to service providers and the burden is on them. We can say users should not give sensitive details to untrusted sources, but that suggestion fails in our case as our list includes even well-established service providers with millions of active users. Users can help us by reporting to the service providers or removing their data until fixed if they see any of these issues in a website.

Examples of the offending services can be found in the paper linked above.

The practice is popular because it imposes lower perceived friction on potential customers. Another benefit is that endpoints don’t have to collect and store usernames and passwords, which have proven over and over to be easily stolen by hackers. Another reason they’re used is the false assumption by the people setting up the service that such links will restrict all others than those who sent the text and endpoint misconfigurations or lack of security reviews of them.

Muhammad, like other security professionals, said authentication links sent by SMS or email aren’t automatically unsafe as long as links are short lived, expire after the first login, and have a cryptographically secure token. Privacy-minded sites, including DuckDuckGo and 404 Media, have opted to authenticate users with a “magic link” that’s sent to an account holder’s email address.

“By not creating a password with us you have no risk of it leaking, and we don’t have to deal with the responsibility of keeping it secure, 404 Media editors wrote. “The sign in link is going to your email, which presumably is protected with two-factor authentication, if you have it set up (which you should!).” Many people who object to the use of magic links fail to realize that many services that require a password already fall back to the equivalent of magic links for account recovery.

To be safe, magic links must be time-limited to lessen the chances of them being used by others. 404 Media says that links expire within 24 hours. DuckDuckGo’s authentication email system works differently. It sends a long one-time password. It’s unclear how long the passcode remains valid.

Magic links also aren’t suitable for sites like Gmail, Office365, or banks that store large amounts of user data and must rely on robust account recovery mechanisms.

Another way to strengthen the security of SMS- or email-based authentication is to require a second factor, in addition to the link sent, although a birthdate, zip code, or other low-entropy factor is insufficient. Further, login attempts must be rate-limited to prevent an attacker from making attempt after attempt until arriving at the right one.

For now, people should recognize that many of the SMS-delivered authentication links they receive may be exposing their sensitive data, and this practice isn’t likely to change soon. Of the 150 affected service providers the researchers were able to contact, only 18 responded and only seven have fixed the failure.

Photo of Dan Goodin

Dan Goodin Senior Security Editor

Dan Goodin Senior Security Editor

Originally published at Ars Technica

Tags: artificial-intelligencebitcoincryptocurrencyfinancetechnology
Previous Post

Lifehacker Deals Live Blog: The Best Tech Sales, All in One Place

Next Post

Judge orders stop to FBI search of devices seized from Washington Post reporter

Next Post

Judge orders stop to FBI search of devices seized from Washington Post reporter

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Old School vs. New School Fashion: Exploring the Pros and Cons

Old School vs. New School Fashion: Exploring the Pros and Cons

January 17, 2024
The Art of Street Style: How to Master the Look

The Art of Street Style: How to Master the Look

April 3, 2024
The Rise of Esports: Where Virtual Battles Shape Real Glory

The Rise of Esports: Where Virtual Battles Shape Real Glory

April 18, 2024

Tiger Global, Microsoft to fully exit Walmart-backed PhonePe via its IPO

January 22, 2026

Former Google trio is building an interactive AI-powered learning app for kids

January 22, 2026
“Crowning Glory: Jannik Sinner’s Masterful Triumph over Medvedev at Miami Open”

“Crowning Glory: Jannik Sinner’s Masterful Triumph over Medvedev at Miami Open”

March 31, 2024
The Ultimate Guide to Planning a Perfect Road Trip

The Ultimate Guide to Planning a Perfect Road Trip

March 2, 2024

Complete High on Life Story Summary: Essential Plot Points for the Upcoming Sequel

February 11, 2026

Navigating the Growing Divide: Challenges in County Cricket’s Future

March 27, 2024

How to Tap Into a ‘Flow State’ In Your Workouts

January 21, 2026

Top 10 Strongest Currencies in the World Right Now

November 21, 2023

6 Trendsetting Earring Fashion Brands to Elevate Your Style

November 15, 2023

How EU Regulators Might Change TikTok

February 6, 2026

The 5 Best Games of 2024: A Year of Innovation and Excitement

January 16, 2024

Sportmax Pre-Fall 2026

January 22, 2026

Tiger Global, Microsoft to fully exit Walmart-backed PhonePe via its IPO

January 22, 2026

Categories

  • Economy
  • Fashion
  • Food
  • Gaming
  • LifeStyle
  • Sport
  • Technology
  • Travel

Recent News

Managing Screen Time in Daily Life: Practical Habits for Better Focus

Managing Screen Time in Daily Life: Practical Habits for Better Focus

February 17, 2026

Prime Minister Defends Peerage Decision Amid Claims Peer Withheld Information About Sex Offender Connections

February 11, 2026
  • Imprint

© 2024 trablog.

No Result
View All Result
  • Home
  • Lifestyle
    • Fashion
    • Food
    • Travel

© 2024 trablog.