The attackers ported victims’ cell phone lines and then defeated 2FA to access accounts and apps. …read more

Source:: Threatpost