Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

This would be a good time to stop what you are doing right now and enable 2FA everywhere you can think of if you haven’t already.

If you control an organisation account enforce it for everyone (github, etc).

I know some places implement it poorly (I’m looking at you SMS based 2FA) but it’s getting to be point where not having it enabled is now a question of when not if you will be compromised. This and Gentoo are recent examples that could have been prevented by 2FA that was available but not enabled.



Not that it’s a bad idea in general, but I don’t think it would help in this situation. I’ve never published NPM packages, but I’m assuming that it only asks for a 2FA token when you first log in, and not every time you publish. Because this thing is stealing local tokens, I think 2FA wouldn’t help.


Possibly not, but it would have prevented the compromise in the first place. My advice was less about helping people affected by this and more about trying to prevent the next one.


Your assumption appears to be incorrect. If you set up 2FA in "auth-and-writes" mode, it does require a 2FA challenge to publish.

Docs: https://docs.npmjs.com/getting-started/using-two-factor-auth...


Maybe NPM should ask for a 2FA to publish every time?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: