Unlock stock picks and a broker-level newsfeed that powers Wall Street.

How a system meant to keep your money safe could put it in danger
two-step authentication
Two-step authentication might not be keeping you as safe as you hoped.

Justin Williams did the right things to secure his PayPal (PYPL) account. And for his trouble he got hacked anyway.

The Denver-based app developer had protected his PayPal account with his mobile number, ensuring that nobody could log in without first entering a random code sent to him via text. And his account at his wireless service, AT&T (T), was itself locked with a passcode separate from his password.

But an attacker kept calling AT&T and eventually got a support representative to ignore the passcode requirement and transfer Williams’ number to a new SIM card. As Williams wrote in his recap, the attacker used that to take over his PayPal account and withdraw a surprisingly low sum: $200 Australian, or about $155.

And that’s how a system meant to keep your money safe could instead leave it in danger — just not as much as if you relied on a password alone.

Your number has to stay your number

But that’s not how phone-based “two-step verification” should work. Your phone number is supposed to stick to the handset in your pocket, ensuring that only you see the text sent to confirm your login and that only you can enter that number at the site asking for the confirmation.

AT&T media-relations vice president Fletcher Cook said in a statement forwarded by a publicist that the carrier’s “various security measures and protocols” weren’t followed this time. He then add: “We are taking additional steps to prevent it from happening again.”

Williams said that after I asked AT&T and PayPal about his case, the carrier offered him “a few months” of service credit and PayPal refunded the fraudulent withdrawal.

AT&T’s competitors Sprint (S), T-Mobile (TMUS) and Verizon (VZ) offer similar secondary-security systems. Sprint’s is mandatory, while T-Mobile and Verizon’s are optional; the former requires you to call in to set up an account verification code, while the latter lets you create an account PIN online.

But if somebody can employ pleasant persuasiveness — “social engineering” — to convince an account rep to transfer a number, you’re not much safer than you were with a password alone protecting your account.

Data breaches can also compromise your account. On Wednesday, the security-research firm Upguard reported that its research director Chris Vickery had found a database of “as many as 14 million” Verizon subscribers — including some account PINs — left accessible online by a contractor.

In a post later that day, Yahoo Finance’s parent firm put the number at 6 million and said the only outsider to view that data was Upguard’s researcher.