Kurt Got Got

This title could be clearer and more informative.Try out Clickbait Shieldfor free (5 uses left this month).

Fly.io's CEO fell victim to a sophisticated phishing attack that compromised their Twitter account for 15 hours. The attacker exploited psychological vulnerabilities by sending a fake alert about a questionable post, prompting the CEO to log in through a fake domain. The incident highlights why phishing-resistant authentication (like FIDO2 and Passkeys) is essential, as training alone cannot prevent all phishing attempts. The company's infrastructure remained secure because it uses SSO with phishing-proof MFA, but their Twitter account was a legacy shared credential managed through 1Password. The attack resulted in a crypto scam post and temporary brand damage, but no user data was compromised.

6m read timeFrom fly.io
Post cover image
Table of contents
How They Got KurtWhy It WorkedWhat Took So LongThe Moral Of The Story Is

Sort: