Reddit has announced it had suffered a "serious attack" in June after a malicous actor intercepted its employees' SMS-based two-factor authentication (2FA) setup.
An attacker compromised a handful of Reddit employees' accounts between 14 and 18 June and gained access to some recent user data, such as email addresses, and all data from between 2005 and 2007, including account credentials and email addresses.
Announcing the breach following an investigation, the social news aggregator said it now realises text message-based 2FA is "not nearly as secure as we would hope" and has recommended everyone moves to token-based 2FA - after identifying this as the most likely point of intrusion.
"Although this was a serious attack, the attacker did not gain write access to Reddit systems; they gained read-only access to some systems that contained backup data, source code and other logs," CTO Chris Slowe posted on Reddit's announcements page.
"They were not able to alter Reddit information, and we have taken steps since the event to further lock down and rotate all production secrets and API keys, and to enhance our logging and monitoring systems."
Slowe said the company became aware of the breach the following day, on 19 June, and had been working with cloud and source code hosting providers to best understand the full extent of what was compromised.
Among other information accessed were tailored 'email digests' sent to users between 3 and 17 June this year, each linked with a username and email address, as well as other data such as Reddit source code, internal logs, and employee workspace files.
Reddit says it has reported the incident to the relevant authorities and is forcing password-resets for users who may have been affected by the incident. Moreover, the company is taking measures to improve security beyond SMS-based 2FA - including enhanced logging, more encryption and token-based 2FA.
The incident highlights the frailty of SMS-based 2FA, with industry voices overwhelming castigating text message as a secure authentication method in the wake of this breach. Phone number hijacking, for instance, spiked shortly after SMS-based 2FA became widely adopted, according to Toby Murray, a computing lecturer at the University of Melbourne.
Even in 2016 the US Federal Trade Commission's chief technologist Lorrie Cranor issued a warning about the ease by which attackers can steal mobile phone numbers in order to bypass 2FA and compromise their sensitive data, after it happened to herself.
"Having a mobile phone account hijacked can waste hours of a victim's time and cause them to miss important calls and messages. However, this crime is particularly problematic due to the growing use of text messages to mobile phones as part of authentication schemes for financial services and other accounts," she wrote on the FTC's website.
"The security of two-factor authentication schemes that use phones as one of the factors relies on the assumption that someone who steals your password has not also stolen your phone number.
"Thus, mobile carriers and third-party retailers need to be vigilant in their authentication practices to avoid putting their customers at risk of major financial loss and having email, social network, and other accounts compromised."
Meanwhile, Reddit's Chris Slowe also announced the company had hired its first head of security two-and-a-half months ago, who he would not identify by name, adding "he has been put through his paces in his first few months".
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2023.
Keumars Afifi-Sabet is a writer and editor that specialises in public sector, cyber security, and cloud computing. He first joined ITPro as a staff writer in April 2018 and eventually became its Features Editor. Although a regular contributor to other tech sites in the past, these days you will find Keumars on LiveScience, where he runs its Technology section.