Coinbase hacked with 2fa

8,445 Views | 50 Replies | Last: 2 yr ago by Proposition Joe
saw em off
How long do you want to ignore this user?
Sorry this happened to you.

If 2fa via sms is the only option then of course, do it, but it's the least secure among the 2fa methods. Get a Yubikey hardware key or at least use Google Authenticator for your codes but a hardware key is the most secure method.
ThreatLevel: Midnight
How long do you want to ignore this user?
Congrats on the sats and I'm sure you already know this but it bears repeating best practices is not to divulge size-able holdings. Lots of info can be attained via roundabout methods for those with proper motivation.

No sense in unnecessary targets.
Thanks & Gig 'Em
KingofHazor
How long do you want to ignore this user?
saw em off said:

Sorry this happened to you.

If 2fa via sms is the only option then of course, do it, but it's the least secure among the 2fa methods. Get a Yubikey hardware key or at least use Google Authenticator for your codes but a hardware key is the most secure method.
I just checked on Yubikey and the financial site has to work with it. The financial sites I use do not.
UmustBKidding
How long do you want to ignore this user?
The auth keys only support FIDO but the series 5 support more including TOTP. So if you vendor supports authentication like google, microsoft, authy you should be able Yubikey5 with it.
KingofHazor
How long do you want to ignore this user?
UmustBKidding said:

The auth keys only support FIDO but the series 5 support more including TOTP. So if you vendor supports authentication like google, microsoft, authy you should be able Yubikey5 with it.

I don't know for sure, but I suspect that most large financial firms do not support any of those but rather have their own private 2FA.

Also, just in general, why would I ever trust google with my personal security? Isn't that precisely like hiring the fox to watch over the chickens?
shalackin
How long do you want to ignore this user?
UmustBKidding
How long do you want to ignore this user?
Well i guess it ok for you to be wrong since almost every firm in the world that supports 2fa at a minimum supports totp.
Having vendor specific methods ensures no will will use two factor. Did a stint with Barclays security group and they had dedicated people to be on all the major 2fa groups to insure that their systems could support all standards that met their security level.
KingofHazor
How long do you want to ignore this user?
UmustBKidding said:

Well i guess it ok for you to be wrong since almost every firm in the world that supports 2fa at a minimum supports totp.
Having vendor specific methods ensures no will will use two factor. Did a stint with Barclays security group and they had dedicated people to be on all the major 2fa groups to insure that their systems could support all standards that met their security level.

I may well be wrong since this stuff is way out of my zone and above my paygrade. However, I checked the Yubikey site. It had a search function for entities that support their device. The two I checked came up with nada.

And the stock brokerage firm I'm with has its own 2fa process and says nothing about any other 2fa. So even if it's theoretically possible, it's extremely difficult.
ThreatLevel: Midnight
How long do you want to ignore this user?
If this is incorrect, big brains feel free to correct this but I believe the intent is to utilize the existing 2FA from an authenticator/pw manager on an app or device in combination with a yubikey to verify that you are the owner of said data. I.E. a hacker in Russia can't spoof the login to your pw manager without also having the physical yubikey required or spoofing it which I don't believe to be very common at this point at least.

Basically it's a lock that requires both a combination and a key to open. One alone will not open the lock.
Thanks & Gig 'Em
agracer
How long do you want to ignore this user?
GarlandAg2012 said:

heavily intoxtricated said:

I have 6 figures of bitcoin in a Coinbase account and made about $22,000 today on the spike (so far). It is protected by nothing other than a 4 digit passcode on my phone, and just my account password on the website. Stupid I know. I also have AT&T. So, this is somewhat concerning. Any clue how it might have happened? Doesn't seem like anyone on this thread has identified how it happened if your sim wasn't swapped.


I believe passkey is the new safest option, but at least move to authenticator based 2FA.

You really should move your coins to cold storage though unless you're actively trading.
unfortunately not all services (Banks, CC, etc.) offer authentication methods for 2FA and only offer SMS. It's kind of infuriating considering SMS can be hacked.
UmustBKidding
How long do you want to ignore this user?
Typically hardware keys are used to replace authentication apps. This also has a physical requirement so that if you leave your token plugged in it would be non responsive until you touch the pad, push the button or it read your fingerprint. This prevents thieves from trying to brute force data from your key if your machine is compromised. But the requirement for a login/password and the result of computation from a hardware token is what is going on. To setup the parties derive keys using a method that prevents you from intercepting the key even if you are watching the transaction. The Timed one time password is likely the least secure strategy but the one everyone implements. The server send you something encrypted with the key you agreed on, you decrypt it, hash it with the current time, encrypt it and send it back. It decrypts and validates it received what it expected. Other methods provide more security. Things like mutual authentication, where using math your can ensure you are talking with who you think you are and they can verify that you are who you say you are. Also the session can be encrypted with a key explicitly setup for a single session or transaction. This prevents you from recording a session and if you figure out the users key in the future you cannot go back and examine what you discussed/transacted in the past. This is typically called Perfect Forward Secrecy. When implementing payment systems we had 4 keys, one to verify the server, one the user used to verify itself to the server, one that was created when you logged on to a session and destroyed at logoff. The fourth was a special session key that was created any time a money movement was done.
Azariah
How long do you want to ignore this user?
A quick scan of the thread didn't see this, but just so you know, 2FA isn't **** unless there is no other way to access your account without it. Most sites that use 2FA have some sort of alternative authentication method because they do not want customers to ever actually lock themselves out. I'm not sure if Coinbase has the feature, but if there is ANY "I can't use my 2FA option" when you try to login, then you don't really have a 2FA protected account.
dubi
How long do you want to ignore this user?
So I am one of the older morons who has 2FA setup on all accounts.

Reading this thread shows me I have lots of work to do with my online accounts.
Proposition Joe
How long do you want to ignore this user?
2FA is still significantly more secure than no 2FA.
Azariah
How long do you want to ignore this user?
Proposition Joe said:

2FA is still significantly more secure than no 2FA.
It depends on the implementation.
Proposition Joe
How long do you want to ignore this user?
Azariah said:

Proposition Joe said:

2FA is still significantly more secure than no 2FA.
It depends on the implementation.

Eh, not really. Poorly implemented 2FA is still more secure than no 2FA.

The lock to your door could be crappy, but it's still provides a bit more resistance that may make someone decide the next house down is an easier target.

It's just best not to assume because you have 2FA you are secure.
Refresh
Page 2 of 2
 
×
subscribe Verify your student status
See Subscription Benefits
Trial only available to users who have never subscribed or participated in a previous trial.