Look up anything

Look up anything

Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

back to top

OKX SIM-swap results in discovery of 2FA safety flaw

Related Article

A flaw within the two-factor authentication (2FA) safety system utilized by crypto and derivatives trade OKX has apparently been found after two customers reported that their accounts had been hacked and their funds drained in a suspected SIM-swapping assault.

The founding father of blockchain safety agency SlowMist, Yu Xian, reported that the customers obtained SMS danger notifications from Hong Kong earlier than a brand new API key was created as a part of their account authentication course of.  

Following up on these studies, safety analysts Dilation Impact (DE) claims to have discovered a flaw in OKX’s authentication system. It mentioned that customers are capable of change from 2FA to ‘lower security verification methods,’ like SMS verification, throughout OKX’s delicate consumer operations. 

Founding father of SlowMist reporting on the 2 OKX accounts. 

Such delicate actions embody withdrawals, whitelisting addresses, altering the login password, and disabling 2FA verification. DE says these actions don’t set off a 24-hour withdrawal ban and {that a} ban is just triggered when logging into a brand new system. 

Moreover, if an handle is whitelisted, DE claims massive quantities of crypto may be withdrawn with out the necessity for added verification. “This quick analysis reveals that OKX’s security settings lack baseline design. Possibly to enhance user experience, OKX has made significant compromises in security,” DE mentioned. 

Learn extra: Watch out for airdrops: Tether CEO warns of mailing record breach

Nevertheless, Yu claimed to be not sure if Google’s authenticator is the ‘key point’ on this assault, including, “There’s no need to panic. If the impact is large, the performance of related events should be more exaggerated. Let’s wait for more disclosures.”

SlowMist claims that they’re monitoring the wallets of the hacker behind the breach of the 2 accounts and have requested anybody struggling the same exploit to contact them.

Obtained a tip? Ship us an e mail or ProtonMail. For extra knowledgeable information, observe us on XInstagramBluesky, and Google Information, or subscribe to our YouTube channel.

Related Article