Why Use an Authenticator App Instead of SMS? (2024)

Two-factor authentication (2FA) has become imperative in today’s digital world, as criminals have learned to compromise almost any password. While SMS-based 2FA is better than no 2FA at all, authenticator apps have the edge because they provide stronger safeguards against threat actors looking to hack into your online accounts.

Twitter’s shift from SMS-based 2FA stirred up quite a bit of controversy and opened a window of opportunity to flood the app stores with scammy 2FA apps.

Twitter said in February that scammers were abusing phone-number-based 2FA. CEO Elon Musk himself argued at the time that SMS-based 2FA was not just insecure, but also a waste of money.

Why Use an Authenticator App Instead of SMS? (2)

Whatever side of the fence you’re on, the truth is that SMS-based multi-factor authentication has quite a few weaknesses that criminals are exploiting.

Weaknesses of SMS 2FA

SIM swapping is one of the best examples of how a thief can defeat 2FA and, say, empty someone’s bank account or crypto wallet. In 2018, crypto investor Michael Terpin – the founder and CEO of Transform Group – got swindled out of almost $24 million by a teenager who intercepted the 2FA codes sent to his number.

Threat actors will use data leaks, public records or social engineering to get your phone number, then bribe or trick a carrier employee to port your number to a duplicate SIM card they control. This enables them to receive your SMS verification codes and break into your various online accounts.

SMS phishing, or smishing, is another popular method fraudsters use to steal verification codes and gain access to a person’s account.

The technique can also facilitate extortion, as was the case of 20-year-old Dennis Su who used stolen records that hackers posted online to send text messages to people threatening to compromise their identity unless they transferred $2,000 to his bank account.

It’s also important to know that SMS messages are transmitted over unencrypted channels, which means they can be intercepted and read by anyone motivated to intercept the message.

And of course, SMS messages can be easily read by anyone with physical access to the victim's phone. Also, there is no way to prevent or control where the SMS is delivered, and SMS 2FA can sometimes be laggy or too indulgent with the code’s expiration time, giving attackers ample opportunity to exploit any weakness.

Pros of using a dedicated authenticator app

Why Use an Authenticator App Instead of SMS? (3)

Authenticator apps are not only faster and more reliable than SMS 2FA, they also enforce an additional layer of security, such as a passcode, a password or biometrics (i.e. fingerprint).

Authenticator apps work locally, meaning there’s no way for an attacker to intercept your codes – unless they’ve infected you with data-stealing malware, but that’s a different discussion.

An authenticator app will show a clear countdown timer for your codes and will generate new ones when the time expires, making it hard for anyone to intercept those codes without access to your phone.

Most importantly, authenticator apps exhibit none of the weaknesses of SMS 2FA.

As mentioned above, scammy 2FA apps can be a problem, so only use a trusted authenticator app from the likes of Google or Microsoft. Apple users can also opt for iOS’s built-in authenticator. Apple’s tool may not be as intuitive as standalone authenticator apps, but it’s still reliable and secure.

Note that multi-factor authentication doesn’t protect against malware, so consider using a dedicated security solution on your personal devices, including your phone.

I am a seasoned cybersecurity expert with a comprehensive understanding of the intricacies surrounding online security, particularly in the realm of multi-factor authentication (MFA). My expertise is substantiated by years of hands-on experience and an in-depth knowledge of the latest trends and vulnerabilities in the digital landscape.

In the article dated March 14, 2023, by Filip TRUȚĂ, the focus is on the crucial role of two-factor authentication (2FA) in today's digital era and the vulnerabilities associated with SMS-based 2FA. As an authority in cybersecurity, I'll provide a detailed breakdown of the concepts discussed in the article.

  1. Two-Factor Authentication (2FA):

    • Definition: Two-Factor Authentication is a security process that requires users to provide two different authentication factors to verify their identity. It typically involves something the user knows (e.g., password) and something the user has (e.g., a mobile device).
  2. SMS-Based 2FA:

    • Definition: This refers to the use of Short Message Service (SMS) for delivering authentication codes as part of the two-factor authentication process.
    • Weaknesses:
      • SIM Swapping: Criminals can compromise 2FA by tricking carriers into transferring a user's phone number to a duplicate SIM card they control, enabling them to receive SMS verification codes.
      • SMS Phishing (Smishing): Fraudsters use phishing techniques via SMS to steal verification codes and gain unauthorized access to accounts.
      • Unencrypted Transmission: SMS messages are transmitted over unencrypted channels, making them susceptible to interception by motivated attackers.
      • Physical Access Vulnerability: SMS messages can be easily accessed by anyone with physical access to the victim's phone.
  3. Authenticator Apps:

    • Definition: Authenticator apps are dedicated applications that generate time-sensitive authentication codes for 2FA purposes.
    • Advantages:
      • Local Operation: Authenticator apps work locally on the device, making it difficult for attackers to intercept codes remotely.
      • Additional Security Layers: These apps often enforce additional security layers such as passcodes, passwords, or biometrics, enhancing overall security.
      • Countdown Timer: Authenticator apps display clear countdown timers for codes and generate new ones when the timer expires, minimizing the risk of interception.
  4. Security Risks and Scams:

    • Scammy 2FA Apps: The article warns about the proliferation of fraudulent 2FA apps in app stores, emphasizing the importance of using trusted authenticator apps from reputable providers like Google, Microsoft, or Apple.
  5. Elon Musk's Perspective:

    • Elon Musk's stance against SMS-based 2FA is highlighted, where he argues that it is not only insecure but also a waste of money.
  6. Recommendations:

    • Users are advised to opt for authenticator apps from trusted sources, such as Google, Microsoft, or Apple, to mitigate the risks associated with fraudulent 2FA apps.
    • The article stresses the importance of using dedicated security solutions to protect personal devices, including phones, against malware.

In conclusion, the article underscores the vulnerabilities of SMS-based 2FA and advocates for the adoption of more secure alternatives like authenticator apps, aligning with the evolving landscape of digital threats and the imperative of robust online security practices.

Why Use an Authenticator App Instead of SMS? (2024)

FAQs

Why Use an Authenticator App Instead of SMS? ›

An authenticator app is safer than SMS authentication because it generates 2FA codes locally, which prevents cybercriminals from intercepting the codes as they can with SMS.

What is the benefit of the authenticator app? ›

An authenticator app is a mobile application that provides an extra layer of security to your online accounts by generating time-based one-time passwords (TOTPs). These passwords are used for two-factor authentication (2FA) and help protect your accounts from unauthorized access.

Is SMS texting more secure than authentication apps? ›

As mentioned before, SMS messages can be intercepted or redirected, whereas authenticator apps generate codes locally on your device, making them much harder for a potential attacker to access.

Why shouldn t we use SMS for 2FA? ›

Without a good mobile defense, hackers can easily intercept and read your messages through spoofing or phishing. This is because SMS messages are not encrypted and rely only on the security of phone networks and companies–which are notoriously easy to access.

Why do I have to use the authenticator app? ›

An authenticator app helps you to improve your online security by adding two-factor logins to any accounts you connect to the authenticator. This makes it harder for hackers to access your accounts, so we highly recommend using an authenticator app and two-factor authentication.

Should I use authenticator app or SMS? ›

You should use an authenticator app over SMS authentication because it is more secure and less likely to be intercepted by cybercriminals. Authenticator apps generate 2FA codes locally on a device, rather than sending them unencrypted over text message.

What are the disadvantages of the authenticator app? ›

Since the verification codes are generated within the app and not sent via text message, attackers cannot easily intercept them. However, there are some drawbacks to using authenticator apps. One of the main concerns is the risk of losing access to accounts if a user loses their device or accidentally deletes the app.

What are the disadvantages of using SMS? ›

Cons: The disadvantages of texting
  • It's not meant for long-form communication. One of the disadvantages of texting communication is that it's not meant to convey long messages. ...
  • It can be hard to discern emotions in a text. ...
  • Some may feel pressure to read and reply to a text right away.

Why is SMS not safe? ›

Like e-mail, SMS is not end-to-end encrypted; the message may remain stored on a server for some time, allowing bad actors to read it at a later date. There are a number of attack scenarios that can allow a malicious party to obtain SMSes that are intended for someone else.

How can I make my SMS more secure? ›

By keeping your device and apps up to date, you reduce the risk of being a victim of SMS-related security threats. Use two-factor authentication (2FA) - Enable two-factor authentication (2FA) for your accounts whenever possible, especially those that rely on SMS for verification.

What is the problem with SMS authentication? ›

The main risks include: Interception of SMS messages: SMS messages are unencrypted and can be intercepted by attackers. Mobile network dependency: Outages can prevent receiving authentication codes. SS7 vulnerabilities: Though less common now, attackers can exploit the SS7 protocol to intercept messages.

Why is 2FA no longer safe? ›

It is not susceptible to common cyber threats.

2FA can be vulnerable to several attacks from hackers because a user can accidentally approve access to a request issued by a hacker without acknowledging it. This is because the user may not receive push notifications by the app notifying them of what is being approved.

Is Microsoft getting rid of SMS MFA? ›

Concerning Office 365, Microsoft announces very soon the end of the MFA by voice and sms (in summary: removal of the channel by telephone network operator because not secure). Microsoft strongly recommends the use of Microsoft Authenticator, available only on smartphones.

What if I don't want to use authenticator app? ›

Under service settings, select Microsoft Authenticator app. Change the setting to Disabled.

Can someone access my authenticator app? ›

You can turn App Lock on or off on the Authenticator Settings page. By default, App Lock is turned on when you set up a PIN or biometric on your device. Unfortunately, there's no guarantee that App Lock will stop someone from accessing Authenticator.

Does authenticator app monitor your phone? ›

No. The Microsoft Authenticator app has no access to change settings or remotely wipe your phone. The visibility Microsoft Authenticator requires is to verify the security of your device, such as operating system version, device encryption status, screen lock, etc.

Is Microsoft Authenticator app necessary? ›

Microsoft recommends using the Microsoft Authenticator app for MFA as it provides an additional layer of security compared to SMS. While the Microsoft Authenticator app is recommended for its security features, it is possible to use SMS as a verification method.

What can authenticator app see? ›

A secure authenticator app does not read your texts, but some of them do check to see what operating system (OS) your phone is using.

Are authenticator apps any good? ›

We Recommend: Microsoft is a great option for storing verification codes for work, school, and personal accounts. We would also highly recommend all Microsoft 365 user enforce MFA using Microsoft's authenticator app. Authy is a desktop and mobile app for two-step verification for any online accounts.

What is the purpose of Google Authenticator app? ›

Google Authenticator is a mobile security application that provides a second type of confirmation for websites and online services that use two-factor authentication (2FA) to verify a user's identity before granting him or her access to secure resources.

Top Articles
Global Recession: Meaning, History, Examples
Only half of top 60 crypto companies have an external auditor
Evil Dead Movies In Order & Timeline
Woodward Avenue (M-1) - Automotive Heritage Trail - National Scenic Byway Foundation
Umbc Baseball Camp
Where are the Best Boxing Gyms in the UK? - JD Sports
Don Wallence Auto Sales Vehicles
Nc Maxpreps
The Idol - watch tv show streaming online
Pwc Transparency Report
Premier Reward Token Rs3
Shreveport Active 911
Fear And Hunger 2 Irrational Obelisk
Destiny 2 Salvage Activity (How to Complete, Rewards & Mission)
Saatva Memory Foam Hybrid mattress review 2024
50 Shades Of Grey Movie 123Movies
Eine Band wie ein Baum
Quadcitiesdaily
Scout Shop Massapequa
Never Give Up Quotes to Keep You Going
European city that's best to visit from the UK by train has amazing beer
6 Most Trusted Pheromone perfumes of 2024 for Winning Over Women
2021 MTV Video Music Awards: See the Complete List of Nominees - E! Online
Vera Bradley Factory Outlet Sunbury Products
Waters Funeral Home Vandalia Obituaries
Tactical Masters Price Guide
Dailymotion
Dentist That Accept Horizon Nj Health
Kaiser Infozone
Kids and Adult Dinosaur Costume
Have you seen this child? Caroline Victoria Teague
Emily Katherine Correro
Martin Village Stm 16 & Imax
How to Draw a Bubble Letter M in 5 Easy Steps
Craigslist Ludington Michigan
Ark Unlock All Skins Command
Trizzle Aarp
Firestone Batteries Prices
2007 Jaguar XK Low Miles for sale - Palm Desert, CA - craigslist
Pain Out Maxx Kratom
Levi Ackerman Tattoo Ideas
Juiced Banned Ad
Toomics - Die unendliche Welt der Comics online
Yourcuteelena
Www Pig11 Net
Christie Ileto Wedding
Craiglist.nj
Google Flights Missoula
18443168434
Ubg98.Github.io Unblocked
Costco Gas Price Fort Lauderdale
Equinox Great Neck Class Schedule
Latest Posts
Article information

Author: Rev. Leonie Wyman

Last Updated:

Views: 6447

Rating: 4.9 / 5 (79 voted)

Reviews: 94% of readers found this page helpful

Author information

Name: Rev. Leonie Wyman

Birthday: 1993-07-01

Address: Suite 763 6272 Lang Bypass, New Xochitlport, VT 72704-3308

Phone: +22014484519944

Job: Banking Officer

Hobby: Sailing, Gaming, Basketball, Calligraphy, Mycology, Astronomy, Juggling

Introduction: My name is Rev. Leonie Wyman, I am a colorful, tasty, splendid, fair, witty, gorgeous, splendid person who loves writing and wants to share my knowledge and understanding with you.