Password Recovery Pitfalls - When Account Recovery Becomes an Attack Vector
About 12 min read
The password recovery process - designed to help users regain access to their accounts - is paradoxically one of the weakest links in authentication security. Attackers increasingly target account recovery flows rather than passwords themselves, because recovery mechanisms often bypass the very security measures that protect the account. A 2024 Google Threat Analysis Group report revealed that account recovery abuse accounted for 28% of targeted account takeovers, surpassing phishing as the primary attack vector in certain categories. SIM swapping attacks against SMS-based recovery have surged 450% since 2021 according to the FBI IC3. This article exposes the structural vulnerabilities in password recovery systems and provides actionable defenses for both users and service designers.
Structural Problems with Email-Based Resets
Email-based password resets are the most widespread recovery method, but from a security perspective, they have the fundamental problem of "making password strength dependent on email account strength." No matter how strong a password you set, if your email account is compromised, your account can be immediately taken over via the reset link.
The technical vulnerabilities compound this issue. Many services generate reset tokens with insufficient randomness or fail to set proper expiration times. A 2023 OWASP analysis found that 12% of surveyed web applications used predictable token generation patterns, and 8% allowed reset tokens to remain valid for over 24 hours. Furthermore, reset links transmitted over unencrypted email can be intercepted through man-in-the-middle attacks on public Wi-Fi networks. For protecting the email account that serves as the foundation of all resets, see our email account protection guide.
SMS Resets and the SIM Swap Threat
There was a time when SMS-based password resets were considered more secure than email. However, the surge in SIM swap attacks has completely undermined that assumption. SIM swapping is a technique where attackers deceive mobile carrier customer support (or use insider accomplices) to transfer the target's phone number to the attacker's SIM card.
According to the FBI IC3's 2023 report, losses from SIM swap attacks reached $48 million annually, with per-incident losses increasing from the $68 million total in 2021 as techniques became more sophisticated. After gaining control of the phone number, attackers can receive all password reset codes and two-factor authentication codes sent via SMS. In other words, SMS-based recovery is a "two birds with one stone" attack vector that lets attackers bypass both passwords and two-factor authentication simultaneously.
Why Security Questions Are Not "Secret"
Security questions remain one of the most dangerous recovery mechanisms still in use. Google's landmark 2015 study "Secrets, Lies, and Account Recovery" demonstrated that 37% of users intentionally provided false answers to security questions for added security, yet these false answers were often forgotten, making recovery impossible. Conversely, truthful answers to common questions like "mother's maiden name" or "city where you were born" can be easily discovered through social engineering or public records searches.
The proliferation of social media has further exacerbated this problem. Facebook profiles list hometowns and schools, while Instagram features photos of family and pets. Answers to questions like "What was your first pet's name?" or "What high school did you graduate from?" can often be determined by browsing the target's social media for just 5 minutes. If you must set security questions, the best approach is to set random strings unrelated to the questions as answers and save them in a password manager.
How to Safely Store Recovery Codes
When you set up two-factor authentication, many services issue backup recovery codes (typically 8-10 single-use codes). These recovery codes are the last resort when you lose your authentication device, but improper storage creates a new attack vector.
The most dangerous storage method is saving recovery codes in email drafts or cloud notes. If your email account is compromised, recovery codes are leaked simultaneously. Saving them as screenshots in your photo library also carries the risk of leakage through cloud sync.
There are three recommended storage methods. First, save them in the secure notes feature of a password manager. Second, print them on paper and store in a fireproof safe. Third, save them offline on an encrypted USB drive. In all cases, don't limit recovery code storage to one location - distribute across 2 or more locations so recovery remains possible even if one location is lost.
For comprehensive password management including recovery code management, password management practical guides (Amazon)can also be helpful.
Common Recovery Flow Design Mistakes by Service Designers
Password recovery vulnerabilities are not just a user-side problem. Structural issues also exist in service provider design.
- Reset token expiration too long: Tokens valid for 24+ hours give attackers ample time. Recommended: 15-30 minutes
- Not invalidating existing sessions after reset: Even after password reset, attacker's existing sessions survive and access continues
- No limit on reset attempts: Attackers can request massive numbers of reset links and attempt token guessing or timing attacks
- Not notifying account owner on successful reset: Legitimate users miss the opportunity to notice unauthorized resets
- Recovery flow bypasses two-factor authentication: Design where completing password reset allows login without re-establishing two-factor authentication
Defenses Users Should Implement Right Now
- Protect your email account as the top priority. Generate a 20+ character random password on passtsuku.com and enable two-factor authentication with a FIDO2 key or authenticator app
- Avoid SMS-based recovery wherever possible. Use authenticator apps or FIDO2 keys instead. If SMS is the only option, contact your carrier to set a SIM transfer PIN. See our two-factor authentication guide for details
- Set random strings for security questions and save them in a password manager. Never set honest answers
- Store recovery codes in two locations: an encrypted password manager and a printed paper copy
- Adopt passkeys on services that support them. Passkey-based authentication eliminates the password recovery problem entirely since there is no password to recover
Frequently Asked Questions
- What should I do if I receive a password reset email I didn't request?
- Do not click the reset link. Immediately log into the service yourself and change your password. Someone may be attempting to access your account. If two-factor authentication is not set up, enable it immediately and check login history for suspicious access. As a precaution, we recommend also changing passwords for other services using the same email address.
- How can I protect myself from SIM swap attacks?
- Contact your mobile carrier to set up additional authentication for SIM transfers (PIN code or in-person verification). The most effective measure is switching from SMS-based two-factor authentication to an authenticator app or FIDO2 security key. Also, it's important not to make your phone number the sole recovery method - set up multiple recovery options.
- Is there a way to set security questions safely?
- The best approach is to set random strings unrelated to the question content as answers and save them in a password manager. Setting a random string like "xK9#mP2vL" for "mother's maiden name" makes guessing from social media impossible. Never set honest answers - they can be easily guessed from information published on social media.