apple patient
  • Home
  • News
  • Rumors
  • Tips & Tricks
  • Tests & Experience Reports
  • Generally
No Result
View All Result
  • Home
  • News
  • Rumors
  • Tips & Tricks
  • Tests & Experience Reports
  • Generally
No Result
View All Result
apple patient
No Result
View All Result

1 million 2FA SMS intercepted: This method protects you

by Milan
June 17, 2025
in News
2FA Codes Security

Image: Shutterstock / May_Chanikran

If you use 2FA, you probably feel safe. After all, this additional layer of security is supposed to prevent strangers from accessing your accounts, even if they know your password. But now a new report shows that this very security measure has been massively undermined: Approximately one million two-factor authentication codes sent via SMS have been intercepted. And not by random hackers, but by a legitimate mobile phone company with ties to intelligence agencies and surveillance firms. Here's what happened—and how you can better protect yourself.

Two-factor authentication (2FA) works like this: You enter your password and receive an additional code – usually six digits – to confirm your identity. The code can be sent via SMS or generated via an app. The goal: increased security. Good in theory. In practice, however, it has been repeatedly shown that SMS is an insecure transmission method. SMS messages are not encrypted; they travel openly through the mobile network. Anyone with access to certain network technology can read these messages. That's exactly what happened.

What exactly happened: One million 2FA SMS intercepted

According to a report by Bloomberg Businessweek and Lighthouse Reports , around one million text messages containing 2FA codes were intercepted in June 2023. An industry insider provided phone connection data showing that all of these messages were routed through a company called Fink Telecom Services. This company is based in Switzerland but operates internationally and has a history of collaborating with government intelligence agencies and surveillance companies. The intercepted messages contained security codes from a variety of major companies, including Google, Meta (Facebook, Instagram & WhatsApp), Amazon, Signal, Snapchat, Tinder, Binance, and several European banks.

Background monitoring: 2FA SMS redirected

The codes were sent to users in over 100 countries on five continents. This was not a random isolated incident, but rather a systematic redirection and analysis of highly sensitive SMS messages. According to the report, Fink Telecom Services was responsible for routing the messages—that is, how the SMS messages reached the recipient via international networks. The company's CFO claims that Fink merely provides technical infrastructure and is not actively involved in surveillance. Security experts disagree: They have linked Fink to cases in the past in which precisely such SMS codes were intercepted and later used for hacks.

Why SMS codes can be intercepted so easily

The major problem with SMS is the lack of encryption. When you receive an SMS, it is transmitted unprotected through the mobile network. This makes it possible for attackers to intercept the messages – especially if they have access to routing points or international exchanges. And that's where Fink Telecom Services comes in. The company operates such exchanges and is therefore able to access large amounts of SMS data. The security gap is therefore no coincidence, but a structural problem in the mobile network – especially with cross-border messages. The combination of technical infrastructure, outdated protocols, and a lack of encryption makes it possible for external actors to read what should actually remain confidential.

Which providers were affected

Affected were companies that send 2FA codes via SMS as standard. These include:

  • Google (e.g. for Gmail or Google Accounts)
  • Meta (Facebook, Instagram)
  • Amazon.com
  • Signal and WhatsApp (although these apps communicate encrypted, their 2FA SMS runs outside the app)
  • Binance (crypto exchange)
  • Tinder, Snapchat
  • Several large European banks

Most of these providers also offer alternatives to SMS-based 2FA – but continue to use SMS as the default option or as a fallback if users don't use an app.

How you can protect yourself

The most important measure: Stop using SMS for 2FA if you can avoid it. Instead, switch to authentication apps. These generate the six-digit code directly on your smartphone, without sending it over a network. Popular apps include:

  • Authy
  • Google Authenticator
  • Microsoft Authenticator
  • as an Apple user you can also use the Passwords app with its own 2FA system

An even more secure method is the use of so-called passkeys. This eliminates the need for a code altogether—instead, you confirm your identity locally on your device, for example, with Face ID or Touch ID. Login is cryptographically secured, and a password or SMS code is no longer necessary.

  • Forgotten your Apple account password? Here's how to get access
  • Protect your Apple account: Set up a recovery contact

SMS-2FA is beyond rescue

This interception clearly demonstrates how vulnerable SMS 2FA is. Even with two-factor authentication enabled, you're not safe if the second component—the code—is transmitted over an insecure system. Therefore, you should review all your accounts and switch to app-based authentication or passkeys as quickly as possible. This will take you a few minutes—but it will better protect you against precisely these types of attacks in the long run. If you want to be on the safe side: Stop using SMS for security codes. Never. (Image: Shutterstock / May_Chanikran)

  • WhatsApp launches advertising: Meta uses this data for it
  • iOS 18.6: Apple launches new beta with focus on stability
  • Apple makes it clear: Music is art, not advertising revenue
Have you already visited our Amazon Storefront? There you'll find a hand-picked selection of various products for your iPhone and other devices – enjoy browsing !
This post contains affiliate links .
Add Apfelpatient to your Google News Feed. 
Was this article helpful?
YesNo
Tags: TechPatient
Previous Post

WhatsApp launches advertising: Meta uses this data for it

Next Post

iOS 18.6 Beta shows: Apple is working on the Smart Display

Next Post
Apple iOS 18.6

iOS 18.6 Beta shows: Apple is working on the Smart Display

iOS 26 lock screen

iOS 26: Five new lock screen features at a glance

June 17, 2025
iOS 26 ringtones

iOS 26: Create your own ringtones – without GarageBand

June 17, 2025
Reminders App iOS 26

iOS 26 Update: What's changing in the Reminders app

June 17, 2025

About APFELPATIENT

Welcome to your ultimate source for everything Apple - from the latest hardware like iPhone, iPad, Apple Watch, Mac, AirTags, HomePods, AirPods to the groundbreaking Apple Vision Pro and high-quality accessories. Dive deep into the world of Apple software with the latest updates and features for iOS, iPadOS, tvOS, watchOS, macOS and visionOS. In addition to comprehensive tips and tricks, we offer you the hottest rumors, the latest news and much more to keep you up to date. Selected gaming topics also find their place with us, always with a focus on how they enrich the Apple experience. Your interest in Apple and related technology is served here with plenty of expert knowledge and passion.

Legal

  • Imprint – About APFEPATIENT
  • Cookie Settings
  • Privacy Policy
  • Terms of Use

service

  • Partner Program
  • Netiquette – About APPLEPATIENT

RSS Feed

Follow Apfelpatient:
Facebook Instagram YouTube threads
Apfelpatient Logo

© 2025 Apfelpatient. All rights reserved. | Sitemap

No Result
View All Result
  • Home
  • News
  • Rumors
  • Tips & Tricks
  • Tests & Experience Reports
  • Generally

© 2025 Apfelpatient. All rights reserved. | Page Directory