If it happens, you’re on the receiving end of a two-factor authentication (2FA) bombing attack.
While the attack may seem scary, you’re completely in control of the situation.
As long as you know how 2FA bombing works, the scammer can’t access your account.
chainarong06/Shutterstock
What Is 2FA Bombing?
Usually, this is the end of the story.
How Does the iOS 2FA Bombing Attack Work?
LookerStudio/Shutterstock
2FA bombing can be effective, but it’s very easy to defend against.
However, a new strain of 2FA bombing that affects iOS users has appeared.
The attack starts as normal.
The scammer sends a wave of iOS 2FA notifications asking you to let them in.
After a few minutes, the scammer stops sending 2FA notifications and calls your phone.
When you pick up, the scammer pretends to be from Apple support.
They’ll claim the wave of notifications was due to a hacker trying to gain access to their account.
They will then ask you for some information under the guise of protecting them.
What’s worrying is that the scammer will already have a lot of information about you.
This is because some services collect data on people, including tying personal information to phone numbers.
This means the caller will know sensitive data like your name, date of birth, and address.
The scammer aims to get a hold of your 2FA code, which you receive via text.
Once you hand over the code, the hacker will access your account.
Remember, they cannot access your account if you do not accept the request.
Decline all 2FA requests you receive that you did not ask for.
If someone calls you asking for a code, do not give it to them.
you might alsostop scam calls on your iPhoneto prevent the scammer from phoning you.
2FA bombing attacks can be scary and mentally draining, but that’s exactly what the scammer wants.