Exposed Database Leaked 2FA Codes for Major Tech Platforms

A critical security lapse exposed millions of one-time authentication codes and password reset links for users of Facebook, Google, TikTok, and other major tech services. The breach originated from an unprotected database belonging to YX International, an Asian technology firm specializing in SMS routing services.

How the Data Breach Occurred

YX International, a company that processes 5 million SMS messages daily, left an internal database publicly accessible without password protection. Security researcher Anurag Sen discovered the exposed system, which contained:

  • One-time passcodes (OTPs) for two-factor authentication (2FA)
  • Password reset links
  • Internal company email credentials
  • Message logs dating back to July 2023

The database was growing in real-time when discovered, with sensitive information visible to anyone with the database’s IP address.

Affected Platforms and Security Implications

The leaked data included authentication codes for:

  • Meta platforms (Facebook, WhatsApp)
  • Google services
  • TikTok accounts

While 2FA provides essential protection against account takeovers, SMS-based authentication carries inherent risks:

  • Messages can be intercepted
  • Databases may be exposed (as in this case)
  • Codes have limited validity periods

Security experts consistently recommend using app-based authenticators (like Google Authenticator or Authy) as more secure alternatives to SMS 2FA.

Discovery and Response Timeline

  1. Discovery: Anurag Sen identified the unprotected database and alerted TechCrunch
  2. Notification: TechCrunch contacted YX International with breach details
  3. Remediation: The company claimed to have “sealed this vulnerability” after being notified

YX International provided no information about:

  • How long the database was exposed
  • Whether unauthorized parties accessed the data
  • Any security logs that might reveal additional access

Industry Response and Best Practices

Major tech companies affected by the breach either declined to comment or didn’t respond to inquiries. This incident highlights several critical security considerations:

  • Vendor risk management: Third-party providers must maintain robust security
  • Data minimization: Limit storage of sensitive authentication data
  • Monitoring: Implement systems to detect unauthorized database access

For users concerned about account security:

  • Consider switching to app-based 2FA where available
  • Regularly review account security settings
  • Monitor accounts for suspicious activity

This breach serves as another reminder that while 2FA significantly improves security, implementation matters. Organizations must ensure proper safeguards for all systems handling sensitive authentication data.


📚 Featured Products & Recommendations

Discover our carefully selected products that complement this article’s topics:

🛍️ Featured Product 1: A&I Genuine Part 1887285M91 TOP LINK CAT 2 ADJ.

A&I Genuine Part 1887285M91 TOP LINK CAT 2 ADJ. Image: Premium product showcase

Carefully crafted a&i genuine part 1887285m91 top link cat 2 adj. delivering superior performance and lasting value.

Key Features:

  • Industry-leading performance metrics
  • Versatile application capabilities
  • Robust build quality and materials
  • Satisfaction guarantee and warranty

🔗 View Product Details & Purchase

💡 Need Help Choosing? Contact our expert team for personalized product recommendations!

Remaining 0% to read
All articles, information, and images displayed on this site are uploaded by registered users (some news/media content is reprinted from network cooperation media) and are for reference only. The intellectual property rights of any content uploaded or published by users through this site belong to the users or the original copyright owners. If we have infringed your copyright, please contact us and we will rectify it within three working days.