Trablog
  • Home
  • LifeStyle
  • Gaming
  • Sport
  • Food
  • Travel
  • Fashion
  • Technology
  • Economy
Thursday, January 22, 2026
No Result
View All Result
  • Home
  • LifeStyle
  • Gaming
  • Sport
  • Food
  • Travel
  • Fashion
  • Technology
  • Economy
No Result
View All Result
Trablog
No Result
View All Result
Home Technology

Millions of people imperiled through sign-in links sent by SMS

January 21, 2026
in Technology
0

Digital generated image of abstract smartphone stylized as mousetrap surrounded by multicoloured social message chat icons.

0
SHARES
0
VIEWS
Share on FacebookShare on Twitter

Story text

* Subscribers only
  Learn more

Websites that authenticate users through links and codes sent in text messages are imperiling the privacy of millions of people, leaving them vulnerable to scams, identity theft, and other crimes, recently published research has found.

The links are sent to people seeking a range of services, including those offering insurance quotes, job listings, and referrals for pet sitters and tutors. To eliminate the hassle of collecting usernames and passwords—and for users to create and enter them—many such services instead require users to provide a cell phone number when signing up for an account. The services then send authentication links or passcodes by SMS when the users want to log in.

Easy to execute at scale

A paper published last week has found more than 700 endpoints delivering such texts on behalf of more than 175 services that put user security and privacy at risk. One practice that jeopardizes users is the use of links that are easily enumerated, meaning scammers can guess them by simply modifying the security token, which usually appears at the right of a URL. By incrementing or randomly guessing the token—for instance, by first changing 123 to 124 or ABC to ABD and so on—the researchers were able to access accounts belonging to other users. From there, the researchers could view personal details, such as partially completed insurance applications.

In other cases, the researchers could have transacted sensitive business while masquerading as the other user. Other links used so few possible token combinations that they were easy to brute force. Other examples of shoddy practices were links that allowed attackers who gained unauthorized access to access or modify user data with no other authentication other than clicking on a link sent by SMS. Many of the links provide account access for years after they were sent, further raising the risk of unauthorized access.

“We argue that these attacks are straightforward to test, verify, and execute at scale,” the researchers, from the universities of New Mexico, Arizona, Louisiana, and the firm Circle, wrote. “The threat model can be realized using consumer-grade hardware and only basic to intermediate Web security knowledge.”

SMS messages are sent unencrypted. In past years, researchers have unearthed public databases of previously sent texts that contained authentication links and private details, including people’s names and addresses. One such discovery, from 2019, included millions of stored sent and received text messages over the years between a single business and its customers. It included usernames and passwords, university finance applications, and marketing messages with discount codes and job alerts.

Despite the known insecurity, the practice continues to flourish. For ethical reasons, the researchers behind the study had no way to capture its true scale, because it would require bypassing access controls, however weak they were. As a lens offering only a limited view into the process, the researchers viewed public SMS gateways. These are typically ad-based websites that let people use a temporary number to receive texts without revealing their phone number. Examples of such gateways are here and here.

With such a limited view of SMS-sent authentication messages, the researchers were unable to measure the true scope of the practice and the security and privacy risks it posed. Still, their findings were notable.

The researchers collected 322,949 unique SMS-delivered URLs extracted from over 33 million texts, sent to more than 30,000 phone numbers. The researchers found numerous evidence of security and privacy threats to the people receiving them. Of those, the researchers said, messages originating from 701 endpoints sent on behalf of the 177 services exposed “critical personally identifiable information.” The root cause of the exposure was weak authentication based on tokenized links for verification. Anyone with the link could then obtain users’ personal information—including Social Security numbers, dates of birth, bank account numbers, and credit scores—from these services.

Of the 701 services, 125 allowed “mass enumeration of valid URLs due to low entropy.” Attackers who had received links from the same service could then easily modify the tokens they had to access other people’s accounts.

Because of the limited view into the practice, these numbers likely significantly undercount the true number of services jeopardizing users’ security and privacy by sending such links.

The likely widespread sending of unsafe links in SMS messages means there are few concrete steps most people can take to protect themselves. Stepping back and assessing the weak authentication processes in general, Muhammad Danish, the lead author of the paper, wrote in an email:

The root causes we found are related to service providers and the burden is on them. We can say users should not give sensitive details to untrusted sources, but that suggestion fails in our case as our list includes even well-established service providers with millions of active users. Users can help us by reporting to the service providers or removing their data until fixed if they see any of these issues in a website.

Examples of the offending services can be found in the paper linked above.

The practice is popular because it imposes lower perceived friction on potential customers. Another benefit is that endpoints don’t have to collect and store usernames and passwords, which have proven over and over to be easily stolen by hackers. Another reason they’re used is the false assumption by the people setting up the service that such links will restrict all others than those who sent the text and endpoint misconfigurations or lack of security reviews of them.

Muhammad, like other security professionals, said authentication links sent by SMS or email aren’t automatically unsafe as long as links are short lived, expire after the first login, and have a cryptographically secure token. Privacy-minded sites, including DuckDuckGo and 404 Media, have opted to authenticate users with a “magic link” that’s sent to an account holder’s email address.

“By not creating a password with us you have no risk of it leaking, and we don’t have to deal with the responsibility of keeping it secure, 404 Media editors wrote. “The sign in link is going to your email, which presumably is protected with two-factor authentication, if you have it set up (which you should!).” Many people who object to the use of magic links fail to realize that many services that require a password already fall back to the equivalent of magic links for account recovery.

To be safe, magic links must be time-limited to lessen the chances of them being used by others. 404 Media says that links expire within 24 hours. DuckDuckGo’s authentication email system works differently. It sends a long one-time password. It’s unclear how long the passcode remains valid.

Magic links also aren’t suitable for sites like Gmail, Office365, or banks that store large amounts of user data and must rely on robust account recovery mechanisms.

Another way to strengthen the security of SMS- or email-based authentication is to require a second factor, in addition to the link sent, although a birthdate, zip code, or other low-entropy factor is insufficient. Further, login attempts must be rate-limited to prevent an attacker from making attempt after attempt until arriving at the right one.

For now, people should recognize that many of the SMS-delivered authentication links they receive may be exposing their sensitive data, and this practice isn’t likely to change soon. Of the 150 affected service providers the researchers were able to contact, only 18 responded and only seven have fixed the failure.

Photo of Dan Goodin

Dan Goodin Senior Security Editor

Dan Goodin Senior Security Editor

Originally published at Ars Technica

Tags: artificial-intelligencebitcoincryptocurrencyfinancetechnology
Previous Post

Lifehacker Deals Live Blog: The Best Tech Sales, All in One Place

Next Post

Judge orders stop to FBI search of devices seized from Washington Post reporter

Next Post

Judge orders stop to FBI search of devices seized from Washington Post reporter

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Represent: Where Innovation Meets Modern Street Style

Represent: Where Innovation Meets Modern Street Style

November 23, 2024

Doctors take inspiration from online dating to build organ transplant AI

January 28, 2024
Controversy Surrounds Persona 3 Reload’s Expansion Pass Pricing

Controversy Surrounds Persona 3 Reload’s Expansion Pass Pricing

April 15, 2024
Navigating the Growing Divide: Challenges in County Cricket’s Future

Navigating the Growing Divide: Challenges in County Cricket’s Future

March 27, 2024
Fernandes Inspires Manchester United to Victory in Dramatic Clash with Sheffield United

Fernandes Inspires Manchester United to Victory in Dramatic Clash with Sheffield United

April 25, 2024
Shake Shack Offers Free Burgers in Honor of Lengthy Oscars Runtime

Shake Shack Offers Free Burgers in Honor of Lengthy Oscars Runtime

March 3, 2024
The Pros and Cons of Gaming Online with Friends vs. Playing Solo

The Pros and Cons of Gaming Online with Friends vs. Playing Solo

January 14, 2024

Campaign Initiated by Spider-Man Enthusiasts to Preserve the Integrity of the Spider-Verse

March 12, 2024

Top 10 Breakthrough Technologies of 2024 Shaping the Future

December 4, 2023

Original Content: Celebrating International Women’s Day

January 27, 2024

20 Essential Tips for Beginner Gamers

January 13, 2024

Taco Bell’s Chicken Nuggets Are Officially Back—And They’re Not Coming Alone

January 22, 2026

Exploring the Latest in Camera Technology: What’s New in 2024

March 25, 2024

Sportmax Pre-Fall 2026

January 22, 2026

How about we discuss the significance of beauty pageants in modern society, or perhaps the impact of beauty standards on individuals and culture?

March 22, 2024

“Crowning Glory: Jannik Sinner’s Masterful Triumph over Medvedev at Miami Open”

March 31, 2024

Categories

  • Economy
  • Fashion
  • Food
  • Gaming
  • LifeStyle
  • Sport
  • Technology
  • Travel

Recent News

Sportmax Pre-Fall 2026

January 22, 2026

Anthropic has to keep revising its technical interview test so you can’t cheat on it with Claude

January 22, 2026
  • Imprint

© 2024 trablog.

No Result
View All Result
  • Home
  • Lifestyle
    • Fashion
    • Food
    • Travel

© 2024 trablog.