Roku enforces 2FA following major security incidents

Roku remote next to iPhone with Roku logo on its screen
(Image credit: Shutterstock)

Roku is now making its users enable two-factor authentication (2FA), after it suffered two sizeable security breaches recently.

In the both incidents, customer data was leaked: first in March, when 15,000 accounts were found for sale on the dark web, which could have allowed those with access to them to purchase subscriptions with the stored payment details within.

Then, earlier in April 2024, Roku suffered another cyberattack which affected over half a million users. Accounts were attacked using the credential-stuffing method, where hackers try to brute force accounts using credentials obtained in other breaches, hoping users have reused the same username and passwords for their Roku accounts.   

Extra protection

Users affected by the latter incident were made to change their Roku account passwords. But now, the streaming service is making two-factor authentication mandatory for all users. The change is already taking place, with users being notified via email to set it up.

2FA typically involves having to input a time-sensitive code - also known as a Time-based One-time Password (TOTP) - after logging in with your username and password. It adds an extra layer of security, to ensure that it is really the user, and not a hacker, who is trying to access your account. 

The TOTP is usually sent to your mobile device, either via an SMS text or using a dedicated authenticator app. These generate a series of codes which constantly refresh for each account that has 2FA enabled. The code must be inputted on the login page in question before it changes to a new code.

For organizations that want to increase security even further, physical security keys can be used instead, which perform the same task, but minimize the risk of being hacked over using a smartphone to generate codes.

Despite the extra protection, 2FA (and also Multi-Factor Authentication (MFA)) is not invulnerable. For instance, SMS is thought to be the least secure delivery method for 2FA codes, since phone numbers can be cloned by cybercriminals in SIM-swapping scams, allowing them to read all the messages you receive.

Cybercriminals can also bombard users with so-called MFA fatigue attacks, where users are prompted to authenticate an illegitimate login attempt, which they accept just to make the notifications stop. These attacks rely on authentication methods that simply ask the user to confirm or deny a login attempt, without needing to input a code.

There have also been reports of hackers stealing session cookies that have already been authenticated by users with MFA, meaning they don't even need to have access to the codes to break into an account.

MORE FROM TECHRADAR PRO

TOPICS
Lewis Maddison
Reviews Writer

Lewis Maddison is a Reviews Writer for TechRadar. He previously worked as a Staff Writer for our business section, TechRadar Pro, where he had experience with productivity-enhancing hardware, ranging from keyboards to standing desks. His area of expertise lies in computer peripherals and audio hardware, having spent over a decade exploring the murky depths of both PC building and music production. He also revels in picking up on the finest details and niggles that ultimately make a big difference to the user experience.

Read more
Representational image of a shrouded hacker.
Getting to grips with Adversary-in-the-Middle threats
A Roku TV with Picture-in-Picture from a connected smart camera
Your Roku TV is getting a big upgrade – if you also have a Roku security camera
Security padlock in circuit board, digital encryption concept
MFA alone won’t protect you in 2025: the new cybersecurity imperative
Isometric demonstrating multi-factor authentication using a mobile device.
Google is ditching SMS - and will now use QR codes for Gmail account authentication
Person using a tablet in an office
Best authenticator app of 2025
Smartphone with new logo X twitter app background. Application twitter old blue bird change X black and white new.
Phishing campaign targets prominent X users, accounts at risk
Latest in Security
Data Breach
Thousands of healthcare records exposed online, including private patient information
China
Juniper patches security flaws which could have let hackers take over your router
Representational image depecting cybersecurity protection
GitLab has patched a host of worrying security issues
Ai tech, businessman show virtual graphic Global Internet connect Chatgpt Chat with AI, Artificial Intelligence.
AI agents can be hijacked to write and send phishing attacks
China
Volt Typhoon threat group had access to American utility networks for the best part of a year
Abstract image of cyber security in action.
MassJacker malware targets those looking for pirated software
Latest in News
Google Pixel 8a in aloe green showing
Google Pixel 9a benchmark link teases the performance of the upcoming mid-ranger
Quordle on a smartphone held in a hand
Quordle hints and answers for Monday, March 17 (game #1148)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Monday, March 17 (game #379)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Monday, March 17 (game #645)
Apple iPhone 16 Pro HANDS ON
Leaked iPhone 17 dummy units may have given us our best look yet at all four models
A super close up image of the Google Gemini app in the Play Store
It's official: Google Assistant will be retired for phones this year, with Gemini taking over