In r/sysadmin and r/cybersecurity, a real help desk near miss shows how attackers use personal details to bypass identity checks, turning routine password resets into credential theft opportunities despite 2FA procedures.
this guy called in asking for a password reset because he was locked out of his laptop.
SOP for password resets done over phone is to send a 2FA code to their email or phone number but I completely fucked up and forgot to authenticate the user.
I reset the AD password without authenticating the
I almost screwed up and let a hacker get away with credentials
implement some automation to ensure that password resets physically cannot be processed without a 2FA code
This finding is one of many signals tracked across Cyber Security. The live feed updates every few hours with new expert voices, debates, and emerging ideas.
← Back to Cyber Security