Phishing Attacks that Defeat 2FA Every Time (2024)

Home » Cybersecurity » Endpoint » Phishing Attacks that Defeat 2FA Every Time

Phishing Attacks that Defeat 2FA Every Time (1)

Protected with 2FA? Think Again.

Two-factor authentication (2FA) is certainly a best practice for corporate security, but cybercriminals are also quite good at defeating it, often without a user’s knowledge. However 2FA is not a panacea and just like cyber awareness training, it is just one part of a total protection program. Assessing the risk of bypassing 2FA is an important part of any risk assessment, so we thought it would be helpful to review some of the threats we repeatedly encounter that defeat 2FA or multi-factor authentication (MFA).

We often hear when engaging with prospects and customers, “We’re safe. We have 2FA.” And yet, we see malicious schemes that 2FA can be evaded by hackers in multiple ways and fails to protect against phishing threats including scareware, social engineering scams, rogue software, and phishing exploits via weaponized documents. SlashNext Threat Labs routinely sees cyber-attacks that have successfully defeated 2FA and MFA. Here are four examples:

  • Man-in-the-Middle Attacks: Many organizations allow employees to use browser extensions that make them more productive, such as specialized ad blockers, file viewers, or file converters. These extensions often have legitimate business functionality, but some also have a side business, and that’s the reason they are free. Their hidden functionality is to act as Man-in-the-Middle spyware in order to collect, use, or sell data, which can include capturing second-factor log-in info, or data that is accessed during that browser session. A browser extension offers cybercriminals the perfect workaround for organizations that rely heavily on 2FA. By design, when a browser extension is installed, it has access to the complete canvas of the browser. This allows it to monitor the session and capture whatever is being rendered on the computer screen. These extensions have the power to see what the user is doing and capture whatever is within that browser window. At SlashNext, we regularly see malicious browser extensionsthat merely wait for the 2FA to complete. For example, a user logs into a ServiceNow Management Portal, once 2FA is complete, the browser extension starts collecting and secretly transmitted data to a C2 server—exposing important business data to bad actors. With bad actors waiting for the user to log-in legitimately before they start collecting data from the browser, 2FA or MFA ceases to be a viable security option to protect organizations.
  • Technical support scams. In addition to rogue browser extensions and Man-in-the-Middle attacks, technical support scams are another way to bypass 2FA security protocols. These phishing scams successfully convince users to install a TeamViewer or some other LogMeIn software, to allow a “tech support expert” to log in remotely to solve their tech problem. However, the TeamViewer session is left open so now a functioning backdoor is open on a device, which is not malware but provides the full backdoor capability to an organization. Access to these compromised machines are then sold on the Dark Web, and even best-of-breed AV will not find them, nor will 2FA have prevented the phishing scheme from accomplishing the goal of compromising the machine.
  • Fake 2FA pages or pop-ups. Phishing is so sophisticated today it can easily emulate the authentication websites themselves. Unsuspecting users have presented a login experience that looks just like their normal 2FA experience but is actually a fake site that captures their authentication codes and user credentials. While the actual session token is not compromised, the user is tricked into providing additional security credentials or qualifying data that they might normally provide in a password recovery experience. This data can then be used by bad actors to access one or more corporate systems.
  • Scareware. Scareware is another way to obtain the credentials they need to subvert 2FA solutions. Security alerts that look like they come from legitimate providers prompt users to reset passwords due to a security threat or breach. This scareware tactic has been found to target hundreds of Chrome users and the result is successfully bypassing 2FA security protocols.

Phishing Attacks that Defeat 2FA Every Time (4)

Example 1: Man-in-the-Middle Attack

Phishing Attacks that Defeat 2FA Every Time (5)

Example 2: Tech Support Scam

Phishing Attacks that Defeat 2FA Every Time (6)

Example 4: Scareware

As 2FA and MFA were designed to help protect unauthorized user log-ins, cybercriminals continue to develop new approaches to access second-factor credentials, spy on browser activity, and compromised machines. So to ensure your organization is protected from these types of attacks take a risk assessment with SlashNext Total Phishing Protection provides complete protection from Credential Stealing, Rogueware, Scams, Scareware and Fraud, across email, SMS, social, messaging, and collaboration services.

See what phishing threats you’re missing by taking our Free and Secure Phishing Risk Assessment. Learn more about 2FA threats and more in The State of Phishing 2021 report.

The post Phishing Attacks that Defeat 2FA Every Time first appeared on SlashNext.

*** This is a Security Bloggers Network syndicated blog from SlashNext authored by Lisa O'Reilly. Read the original post at: https://www.slashnext.com/blog/phishing-attacks-that-defeat-2fa-every-time/

Phishing Attacks that Defeat 2FA Every Time (2024)

FAQs

Phishing Attacks that Defeat 2FA Every Time? ›

While 2FA is a popular way of added account protection, it, too, can be bypassed. Scammers steal verification codes by using various techniques and technologies, such as OTP bots and multi-purpose phishing kits that they control in real time with the help of administration panels.

Can phishing bypass 2FA? ›

While 2FA is a popular way of added account protection, it, too, can be bypassed. Scammers steal verification codes by using various techniques and technologies, such as OTP bots and multi-purpose phishing kits that they control in real time with the help of administration panels.

Can hackers beat 2FA? ›

Most 2FA methods involve sending temporary codes via SMS or emails, but these can be easily intercepted by hackers through account takeover, SIM swapping, and/or MitM attacks. To avoid these vulnerabilities, businesses should use authenticator apps like Google Authenticator or Microsoft Authenticator.

What attacks bypass MFA? ›

The threat actor will use phishing to trick users into revealing personal information. To bypass MFA, threat actors will send emails or text messages asking for a victim's 2FA code or linking them to a spoofed website that will prompt them to enter their login credentials and 2FA code.

Which massive EvilProxy phishing attack campaign bypasses 2FA targets top level executives? ›

Massive EvilProxy Phishing Attack Campaign Bypasses 2FA, Targets Top-Level Executives. This attack sent approximately 120,000 phishing emails to organizations worldwide with the goal to steal Microsoft 365 credentials.

How phishing bypasses MFA? ›

Other phishing-enabled MFA bypass techniques used include: Clickjacking (the malicious use of an altered interface designed to manipulate the user into unknowingly visiting or accepting something unintended), Keystroke Logging (the capture of authentication codes as they are inputted by the user), and Brute Force (a ...

What is more secure than 2FA? ›

Multi-factor authentication (MFA) is more secure than two-factor authentication (2FA) These two terms are often used interchangeably, but they're not quite the same thing. 2FA requires exactly two authentication types to unlock something. MFA requires a minimum of three forms of authentication.

Why 2FA is no longer safe? ›

Even if the user doesn't respond to a push login request or doesn't enter a One-Time Password (OTP) when prompted, a hacker still knows they have a working password now; how, because the delay for the denied message takes longer... Most of us know where this is going; the hacker is persistent in their login attempts.

Is 2FA 100% secure? ›

While using two-factor authentication makes things more secure, it's not a 100% guarantee of security. So it's important to adopt and maintain good online security habits. These include, setting strong passwords, not sharing your passwords with others, and not leaving your phone unattended.

Is 2FA impenetrable? ›

The Security Shield: 2FA's Impenetrable Wall

Passwords, often reused and easily compromised, become mere pebbles against the battering ram of cyberattacks.

Is MFA vulnerable to phishing? ›

Technology such as MFA is, therefore, key in preventing phishing attacks. Yet, traditional MFA has been proven weak. Now, phishing-resistant MFA is entering the picture, with authentication techniques, such as Web Authentication (WebAuthn) and public key infrastructure (PKI)-based MFA, that can stop MFA bypass attacks.

What attacks are prevented by multifactor authentication? ›

MFA systems require two or more factors to verify a user's identity and grant them access to an account. MFA provides reliable assurance that an authorized user is who they say they are, thus minimizing the possibility of unauthorized access.

What type of attacks can mutual authentication prevent? ›

Mutual authentication can prevent spoofing attacks because the server will authenticate the user as well, and verify that they have the correct session key before allowing any further communication and access.

Who is most targeted by phishing attacks? ›

Phishing Attack Trends

In the second quarter of 2023, over 23% of phishing attacks around the world aimed at financial institutions. Close behind, social media platforms were targeted by about 22.3% of phishing attempts. Similarly, web-based software services and webmail also accounted for 22.3% of the attacks.

Which phishing targets just one customer? ›

1. Spear phishing. Spear phishing involves targeting a specific individual in an organization to try to steal their login credentials. The attacker often first gathers information about the person before starting the attack, such as their name, position, and contact details.

Which of the following is the most sophisticated phishing attack? ›

Spear phishing

There are two other, more sophisticated, types of phishing involving email. The first, spear phishing, describes malicious emails sent to a specific person. Criminals who do this will already have some or all of the following information about the victim: Their name.

Does MFA stop phishing? ›

One of the best defenses against credential-stealing phishing attacks is multifactor authentication. MFA imposes an additional step that individuals must take to be allowed access.

Does 2FA prevent session hijacking? ›

Enabling two-factor authentication continues to become the gold standard for preventing session hijacking. If the user's credentials become compromised and the hackers attempt to log into a site having two-factor authentication enabled, it will block this attack.

How to get past 2-Step Verification if you lost your phone? ›

If you've lost access to your primary phone, you can verify it's you with:
  1. Another phone signed in to your Google Account.
  2. Another phone number you've added in the 2-Step Verification section of your Google Account.
  3. A backup code you previously saved.

How authentication is bypassed by attackers? ›

By stealing session cookies or session tokens, attackers bypass authentication controls and gain unrestricted access to the victim's account. Brute Force Attacks: Brute force attacks involve systematically guessing usernames and passwords until the correct credentials are discovered.

Top Articles
TradingView.com Review: Read Before You Upgrade - Top Trade Reviews
Buy and Sell CONFIRMATION ENTRY — Indicator by TopgOptions
9.4: Resonance Lewis Structures
Koopa Wrapper 1 Point 0
My E Chart Elliot
Star Sessions Imx
Missed Connections Inland Empire
Songkick Detroit
Bernie Platt, former Cherry Hill mayor and funeral home magnate, has died at 90
Housework 2 Jab
Find Such That The Following Matrix Is Singular.
Nail Salon Goodman Plaza
Vrachtwagens in Nederland kopen - gebruikt en nieuw - TrucksNL
Erica Banks Net Worth | Boyfriend
Vigoro Mulch Safe For Dogs
The Blind Showtimes Near Amc Merchants Crossing 16
Catherine Christiane Cruz
Theater X Orange Heights Florida
Ezel Detailing
Brbl Barber Shop
Engineering Beauties Chapter 1
Yugen Manga Jinx Cap 19
Prey For The Devil Showtimes Near Ontario Luxe Reel Theatre
Costco Jobs San Diego
Lacey Costco Gas Price
Vivification Harry Potter
Roseann Marie Messina · 15800 Detroit Ave, Suite D, Lakewood, OH 44107-3748 · Lay Midwife
CohhCarnage - Twitch Streamer Profile & Bio - TopTwitchStreamers
Spirited Showtimes Near Marcus Twin Creek Cinema
Evil Dead Rise Showtimes Near Regal Sawgrass & Imax
Nurtsug
Mercedes W204 Belt Diagram
Red Sox Starting Pitcher Tonight
Nsu Occupational Therapy Prerequisites
To Give A Guarantee Promise Figgerits
Wsbtv Fish And Game Report
Hebrew Bible: Torah, Prophets and Writings | My Jewish Learning
Evil Dead Rise (2023) | Film, Trailer, Kritik
Compare Plans and Pricing - MEGA
Craigslist Ludington Michigan
“To be able to” and “to be allowed to” – Ersatzformen von “can” | sofatutor.com
Gregory (Five Nights at Freddy's)
Shipping Container Storage Containers 40'HCs - general for sale - by dealer - craigslist
Atu Bookstore Ozark
Youravon Com Mi Cuenta
Phmc.myloancare.com
Human Resources / Payroll Information
The Machine 2023 Showtimes Near Roxy Lebanon
Smoke From Street Outlaws Net Worth
Causeway Gomovies
Tyrone Dave Chappelle Show Gif
All Obituaries | Roberts Funeral Home | Logan OH funeral home and cremation
Latest Posts
Article information

Author: Roderick King

Last Updated:

Views: 6105

Rating: 4 / 5 (51 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Roderick King

Birthday: 1997-10-09

Address: 3782 Madge Knoll, East Dudley, MA 63913

Phone: +2521695290067

Job: Customer Sales Coordinator

Hobby: Gunsmithing, Embroidery, Parkour, Kitesurfing, Rock climbing, Sand art, Beekeeping

Introduction: My name is Roderick King, I am a cute, splendid, excited, perfect, gentle, funny, vivacious person who loves writing and wants to share my knowledge and understanding with you.