Spurious recovery is indeed one of the weak links in the account security chain. Insufficient checks that the recoverer is indeed the account creator. It should require more than just an email address, because email addresses can become comprimised by so many means. Once a hijacker has gotten a fake recovery request accepted once, it can sometimes be difficult to prevent them from gaining further fake recoveries on the same account.
23-Mar-2019 22:04:34
- Last edited on
23-Mar-2019 22:05:10
by
Zparanoid