blog

Million-Code Heist: Why Your 2FA Texts Aren’t Safe and How to Fix It

Written by Randy Cooper | Jun 20, 2025 9:44:05 AM

A Million 2FA Codes Intercepted?

Hey there, tech-savvy readers! You might want to sit up for this one because a recent report just dropped a bombshell: around a million SMS two-factor authentication (2FA) codes were intercepted. Yep, those little six-digit codes that are supposed to keep your accounts super secure? They’ve been passing through some shady hands. According to a whistleblower in the tech industry, these codes went through an obscure foreign company with ties to government intelligence and digital surveillance firms. This news, reported by 9to5Mac, is a wake-up call about the vulnerabilities of SMS-based 2FA. Let’s dive into what this means and what you can do to protect yourself.

Why SMS 2FA Isn’t as Safe as You Think

First off, let’s break down how 2FA works and why this interception is a big deal. Two-factor authentication is like a double lock on your accounts. Even if a hacker snags your password, they need that second key—a six-digit code sent to your phone or generated by an app—to get in. The problem? SMS messages, unlike app-based codes, are totally unencrypted. That means they’re like postcards flying through the telecom network, and anyone with the right tools (or connections) can peek at them. This report revealed that a company with questionable ties was handling a ton of these codes, putting accounts from companies like Google, Meta, and Amazon at risk. It’s a stark reminder that SMS isn’t the fortress we thought it was.

How Did This Even Happen?

So, how did this mess go down? Well, when companies send out those 2FA codes via text, they often don’t send them directly. Instead, they use third-party telecom services to save time and money. In this case, a Swiss company called Fink Telecom Services was in the middle of the action, routing over a million 2FA codes in June 2023. The catch? This company has links to surveillance and intelligence operations, which raises some serious red flags. While Fink’s CEO claims they don’t mess with the data, the fact that unencrypted SMS codes are floating through such networks is a huge vulnerability. It’s like handing your house keys to a stranger and hoping they don’t make copies.

How to Lock Down Your Accounts

Now, don’t panic just yet—there are ways to lock down your accounts better. The best move is to ditch SMS-based 2FA whenever possible. Instead, go for authenticator apps like Google Authenticator or Microsoft Authenticator. These apps generate codes right on your device, so they never travel through sketchy networks. Even better, consider using WebAuthn-based methods like biometrics or passkeys, which are stored locally and super resistant to phishing. If a service only offers SMS 2FA, nudge them to add more secure options—or at least be extra cautious about phishing scams that might trick you into sharing your code. The bottom line: the more layers of security you add, the harder it is for hackers to crack your accounts.

Stay Safe and Stay Smart

To wrap things up, this interception scandal is a reality check for anyone relying on SMS for 2FA. It’s convenient, sure, but it’s also like leaving your front door unlocked in a sketchy neighborhood. Switch to authenticator apps or hardware-based options like YubiKey for peace of mind. And hey, keep an eye out for services that force SMS 2FA—maybe give them a gentle nudge to step up their game. Your digital life deserves better protection, and with a few small changes, you can stay one step ahead of the hackers. Stay safe out there, folks!

SOURCE: https://9to5mac.com/2025/06/17/a-million-sms-two-factor-authentication-codes-were-intercepted-heres-what-to-do/