Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It says right there in the linked page that the phishing attack was able to manipulate multiple employees into giving access past their 2FA.


Yeah, that answers 1 of the questions. But we still don't know what type of 2FA was being used, or what technique the attackers used.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: