Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

This is very similar to how MFA bypasses are done now. The user will be tricked into viewing a site that looks like the correct one to input the MFA code but it will instead be captured and relayed through an attacker controlled connection.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: