How do I stop this?

Summary

This incident describes active account compromise and device control loss, not a benign technical glitch. The symptoms—unauthorized screen interaction, account takeover alerts, unrecognized contact information, and passkey exposure—indicate an attacker has already established persistent access across identity, device, and application layers. The immediate priority is identity lockdown, session invalidation, and device re-trust before attempting to understand the attacker’s entry vector. Delaying containment risks further data exfiltration, lateral movement, and persistent backdoor access.

Root Cause

The root cause is compromised credentials combined with successful MFA bypass or session hijacking, likely achieved via one or more of:

  • Stolen primary credentials from a data breach, phishing, or malware on a trusted device.
  • Successful MFA fatigue or SIM swap (evidenced by unrecognized phone numbers and SMS-based alerts).
  • Malware or remote access tool (RAT) installed on the victim’s device enabling UI automation and passkey exfiltration.
  • OAuth token or refresh session theft allowing the attacker to maintain persistent access even after password changes.
  • SIM swap attack enabling interception of SMS OTPs and account recovery flows, tying the attacker’s phone number to the victim’s identity.

Why This Happens in Real Systems

Real-world identity systems are complex and porous by design:

  • Password reuse and credential stuffing remain rampant; attackers automate credential tests across high-value services.
  • SMS-based 2FA is inherently vulnerable to SIM swapping and SS7 exploits; carriers do not uniformly secure number porting.
  • Device trust models persist after initial authentication; an attacker can register their own device as “trusted” and ride long-lived refresh tokens.
  • Passkey synchronization (e.g., via iCloud Keychain, Google Password Manager) can be compromised if the cloud identity is itself compromised.
  • Push notification fatigue and permissive UX lead to accidental approvals, especially under time pressure.

Real-World Impact

  • Immediate loss of account control: attacker can read, send, delete, and modify data.
  • Financial and reputational damage: unauthorized transactions, fraud, or public data leaks.
  • Lateral compromise: if the same credentials or devices are reused, other accounts are at risk.
  • Persistent access: attackers often add recovery emails, API keys, or alternative MFA methods to re-gain access if you lock them out once.
  • User paralysis and secondary attacks: the victim may be locked out during critical windows while attackers execute additional scams.

Example or Code (if necessary and relevant)

No executable code is applicable for an immediate user-facing remediation playbook. The required actions are manual administrative steps within the compromised services and carrier systems.

How Senior Engineers Fix It

Senior engineers execute a contain-first, investigate-later strategy:

  • Force log out all sessions globally across the compromised account and all linked services (e.g., Google “Security Checkup”, Apple “Find My” device removal).
  • Revoke all OAuth tokens, app passwords, and API keys; generate new secrets immediately.
  • Change password to a unique, high-entropy passphrase from a clean device.
  • Inspect and remove unknown MFA devices and recovery methods (phone numbers, authenticator apps, backup codes, passkeys).
  • Contact the carrier to lock SIM changes and port-out protection; enable hardware security keys (FIDO2/WebAuthn) for MFA and remove SMS as a factor.
  • Perform a full malware scan on all devices using reputable tools; consider rebuilding compromised devices if root-level access is suspected.
  • Check account recovery history for email and phone changes; restore to the last known-good state.
  • Monitor and revoke suspicious cloud sync (e.g., iCloud, Google Account) and reset the cloud identity password.
  • Notify contacts of potential impersonation and enable alerts for future account changes.

Why Juniors Miss It

  • Attributing symptoms to “glitches” rather than seeing the pattern of unauthorized control.
  • Incremental fixes (e.g., only changing password) without invalidating sessions or revoking tokens.
  • Trusting SMS as a secure second factor despite visible evidence of SIM compromise.
  • Failure to inspect cloud sync and passkey storage, assuming passkeys are immutable.
  • Underestimating attacker persistence: failing to remove all registered devices and recovery vectors leads to re-compromise.
  • Not using a trusted, clean device for remediation, risking re-infection during the lockout process.