OTP Bombing
quality 7/10 · good
0 net
Tags
OTP Bombing | by d0natel00(KiroMoheb) - Freedium
Milestone: 20GB Reached
We’ve reached 20GB of stored data — thank you for helping us grow!
Patreon
Ko-fi
Liberapay
Close
< Go to the original
OTP Bombing
How To Make People Unable To Use Their Phones or Emails
d0natel00(KiroMoheb)
Follow
~4 min read
·
April 3, 2026 (Updated: April 3, 2026)
·
Free: Yes
Bad Hackers Have Gifts For YOU
Hello Friend, Today I'm Going To Explain OTP Bombing and How Malicious Actors Exploit this and Make it as a Service !
☠️ Warning: Performing OTP Bombing on any Person Email or Phone Number Even For Pranks is a Cybercrime in Most Countries Law
What is OTP Bombing ?
When a User Creates a New Account The App Want Him To Confirm That a Phone Number or an Email Belongs to Him OR an App Want You To Confirm on Some Sensitive Action It Sends You an OTP (One Time Password) → a Code Mostly From 4–6 Digits and Sometimes Mixed Chars+Digits.
That is Good Intention Right ! . But, Hackers Exploited That and Sent A lot of OTPs To Someone's Email or Phone Number Via (SMS or Automated Phone Call) That Makes the Victim Unable To Use the Service .
Imagine, That You as a Normal Person Using your Email and Phone and You Open Your Inbox Seeing A lot of OTP Messages Comming From a Lot of Emails and A Flood of Notifications Even Can Make your Device Glitch and Drain Your Battery .
Severity on Hackerone and BugCrowd
Hackerone → N/A | INFO
LOW
Real Example From a VDP
Note: I Used https://temp-mail.org/ To Get a POC
I Found, Signup page Without a Captcha So I Signed UP as a Normal User
Fake-Email: [email protected]
Signup Page
Even the Phone Number, It Doesn't Check if It Belongs To You or Not !
Send OTP
Simply, It Sends a POST Request to an API Endpoint /api/otp/otp_generate/ and It Responds With :
OTP Sent
I Sent It Again From the Terminal Without Specify any Cookie Headers or Something and Got the Same Response
Without Any Restrictions
Let's Get the POC With the Burp Intruder
100 POST Request
I Configured the Intruder to Do 100 POST Request with NULL Payloads (Don't Do Anything Just Like a For Loop)
100 Tested Without Any Error
We Got No Error All Sent, Let's See Our Inbox After this Only 100 Request
This is a Flood of OTPs (Just 100 From One Source)
What Real Maliciuos Actors Does, is Combining More Vulnerable APIs For OTP Bombing Like this One and Start Sending OTP Messages To Targets Emails and Phone Numbers .
Signs of OTP Bombing :
Lack of Secure Captcha (Not Bypassable Ones)
Lack of Ratelimiting
Lack of Small Time Lockouts (Like 1 Minute After a Successful Request)
Why Malicious Actors Does That :
They Make is as a Service. Someone, Pays To Harassment Someone and They Do . or Even for Making Companies That Own those Vulnerable APIs Lose Money
Main 3 Reasons :
Users Harassment
Financial Loses To Companies
Distraction (If they Did Something That a Victim Will Get Notified With a Message For Example They Send a Ton of OTP Messages to Make the User Unable To See What Happened Like a Password of a Social Media Account Changed or Something)
I Hope You Took any Useful Information From this Writeup .
Goodbye !
#cybersecurity #bug-bounty
Reporting a Problem
Sometimes we have problems displaying some Medium posts.
If you have a problem that some images aren't loading - try using VPN. Probably you have problem with
access to Medium CDN (or fucking Cloudflare's bot detection algorithms are blocking you).