Hacker Timesnew | past | comments | ask | show | jobs | submitlogin

It says right there in the linked page that the phishing attack was able to manipulate multiple employees into giving access past their 2FA.


Yeah, that answers 1 of the questions. But we still don't know what type of 2FA was being used, or what technique the attackers used.




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: