CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Twitter logo on smartphone screen showing 2FA account security
Cyber SecurityNews
·4 min read

Twitter to Make SMS-Based 2FA Account Security a Paid Premium Feature in March

Scott Ikeda·February 24, 2023
TwitterFacebookLinkedIn

Tech platforms often have to advertise and cajole users into enabling their free 2FA account security options. Twitter has taken a different tack in deciding to make SMS-based 2FA a premium feature available only to paying subscribers, beginning on March 20 2023.

Twitter cites abuse of the text messaging 2FA option by bad actors as the reason for the change in policy. The service will still allow free use of authentication apps or hardware security keys as an additional account security layer. Twitter supports all time-based one time password (TOTP) authentication apps that generate QR codes, and has offered the option to use multiple security keys since mid-2021.

Most commonly used 2FA method will require paid Twitter subscription

The move is part of a general push to drum up revenue for the platform via the premium Twitter Blue subscription option, which starts at $8 per month or $84 per year. The campaign to convince users to pay for Twitter has seemed haphazard and without clear strategy at times, and appears to be floundering as a recent internal document leak indicates that only about 0.2% of Twitter users have been convinced to open their wallets as of yet.

While Twitter is not eliminating free 2FA options entirely, SMS or text message methods are generally the most widely used as they are the least complicated and require no extra hardware or software (a phone is not even strictly necessary with the use of assorted online services).

Authenticator apps require users to at least have a somewhat recent smartphone; hardware security keys run from about $25 to $100, and are another object that people need to remember to bring with them (and not lose track of). The text message method meets with some amount of discouragement from security professionals, as it can be circumvented via phishing or a SIM swap attack, but it is widely seen as being better than nothing and a requisite courtesy for tech platform users.

The move also takes 2FA entirely out of the hands of most of Twitter’s global user base, even if they are willing to pay for Twitter Blue. The enhanced subscription is only available in 15 countries at present; it has yet to roll out across most of Europe, let alone in nearly all of Asia, Latin America and Africa. Twitter has said that it plans to expand the subscription service globally, but it is not clear how long that will take.

Twitter’s own internal numbers (published in July 2022) find that only 2.6% of its active users have any kind of 2FA in place, but 76% of those use text messaging. The vast majority of the rest use an authenticator app; fewer than 1% use a hardware key.

Account security change makes little sense to security researchers

Certain other tech platforms have been in a slow and gradual process of deprecating SMS 2FA, though not in an attempt to get users to pay for it as if it was some sort of premium feature. These efforts have made clear to users that SMS is not a particularly good method of account security, and gives them ample time to familiarize themselves with one of the more secure methods and move to it.

A series of tweets that CEO Elon Musk interacted with seems to indicate that the primary motivation for this move may be in saving tens of millions of dollars annually on spam SMS messages. Certain telephone companies in “other parts of the world” were accused of billing Twitter millions of dollars by using bots to send bogus 2FA messages over and over.

Whatever the reason, both tech platforms and security experts would generally like to steer users away from SMS 2FA in the long run due to providing something of a false sense of account security. But there is presently nothing that is as easy or accessible for the end user as an alternative, and SMS does add a substantial layer of security so long as the user does not fall for a phishing message (or have their SIM number stolen). While there are a number of free authenticator apps, they require a smartphone to be handy at every login, and the no-cost options generally involve either another big tech firm that customers may have reservations about (such as Google or Microsoft) or a smaller company that has had its own security issues (such as Twilio and LastPass).

Rob Griffin, CEO at MIRACL, suggests that the concept of MFA should be reconsidered to bring multiple security layers back to a single login step that anticipates how far the average user is willing to go (or not go) in terms of account security practices: “To assure the security of any online account, users should always implement MFA – relying on a password or any single factor will leave them vulnerable.  Users’ reluctance is purely because historically MFA has meant a dreadful user experience. No longer. Single-step MFA enables a website’s users to authenticate securely in 2 seconds on any device or browser without password or friction. The cost and task of implementing are so small and the security benefits so big that operators who don’t adopt single-step MFA are frankly failing a duty of care to their customers.”

Twitter cites abuse of the text messaging #2FA option by bad actors as the reason for the change in policy. The service will still allow free use of authentication apps or hardware security keys as an additional account #security layer. #respectdataClick to Tweet

Darren James, Senior Product Manager with Specops Software, takes the opposite view; consumers need to be pushed into choosing a better account security setup than SMS 2FA as it is simply too vulnerable to continue being viable for long: “Off the back of the latest Twitter breach in December last year, the removal of using SMS as a 2FA method for non paying users does initially seem like a bad idea – any 2FA is better than no 2FA. However, this does highlight that not all 2FA options are equal and that there are better alternatives to the weaker 2FA methods such as SMS and Secret Questions – even if this looks like it’s more driven from a cost saving perspective rather than security. Don’t forget while your signing up for your new Twitter 2FA it would also be a good idea to update your password as well – just make sure it’s a strong one!”

 

TwitterFacebookLinkedIn
Tags
2FAAccount SecurityTwitter
Scott Ikeda
Senior Correspondent at CPO Magazine
Scott Ikeda is a technology futurist and writer for more than 15 years. He travels extensively throughout Asia and writes about the impact of technology on the communities he visits. Over the last 5 years, Scott has grown increasingly focused on the future landscape of big data, surveillance, cybersecurity and the right to privacy.
Related
Twitter mobile app on smartphone showing FTC investigation into privacy practices
Data ProtectionNews

FTC Investigation Into Twitter Privacy Practices Ramps up With Request to Interview Elon Musk

March 15, 2023
Hands of woman using smartphone with Twitter showing data leak
Cyber SecurityNews

Twitter Now Claims Data Leak of 200 Million Profiles Was Phony, Data Set Was Assembled From Pre-Existing Sources

January 18, 2023
Fingers hold a closed security lock on the background of the Twitter logo showing Irish DPC probe of data breach
Data ProtectionNews

Irish DPC Adds Late December Data Breach of 400 Million Twitter Users To Existing Probe of API Vulnerabilities

January 5, 2023
Setting password on new titanium Apple Watch Ultra showing passwordless future with passkey
Cyber SecurityInsights

As Apple Drives Consumers Towards a Passwordless Future, Are Enterprises Ready for the Next Generation of Authentication?

December 12, 2022
Logo of Twitter in the reflection of a broken mirror showing data leak
Cyber SecurityNews

Data Leak Exposes Private Profile Information of 5.4 Million Twitter Users, Dumped for Free on Underground Forum

December 2, 2022
Shadow of a spy with digital background showing insider threats
Cyber SecurityInsights

Thinking Beyond Spies at Twitter: Insider Threats Are a Growing Danger — And Can Come From Anyone

August 29, 2022
Twitter logo on smartphone showing whistleblower report slams Twitter security and privacy
Cyber SecurityNews

Whistleblower Report Slams Twitter Security and Privacy Practices, Asserts Company Deceived Public and Is Employing Foreign Agents

August 26, 2022
Twitter logo on mobile phone screen showing Twitter API keys used for account hijacking
Cyber SecurityNews

Thousands of Mobile Apps Are Leaking Twitter API Keys, Could Be Used for Account Hijacking

August 12, 2022

Latest

View of a large coal-fired power plant showing critical infrastructure warning of ransomware attacks by CISA

New CISA Program to Warn Critical Infrastructure Companies of Vulnerabilities That Could Invite Ransomware Attacks

Hand inserting dollar bills in Bitcoin ATM showing crypto theft

Bitcoin ATMs Hacked, Millions in Crypto Stolen as Threat Actors Exploit an Upload Vulnerability

Webpage of ChatGPT showing chat histories exposed by ChatGPT bug

Titles of User Chat Histories Exposed by ChatGPT Bug

Chinese national flag on circuit board showing Chinese hackers cyber attacks

Chinese Hackers Targeting Outer Layers of Networks for Cyber Attacks, Using New Malware for “Multi-Year” Intrusions

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources

Stay Updated

© 2023 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results