Why Email Multi-Factor Authentication (MFA) Security Doesn't Work (2024)

When 2-factor authentication (2FA) is combined with password managers like 1Password and LastPass, it can help people securely access their personal and work accounts, and make it more difficult for hackers to breach private data. But thosetaking advantage 2FA often use the most insecure version of it — such as email and SMS-based codes that hackers can acquire with ease.

Multi-Factor Authentication (MFA) security raises the barrier to account access by requiring another proof of identity (usually in the form of an alphanumeric code), but it does not stop phishing. Specifically, MFA does nothing to stop Business Email Compromise (BEC), Account Takeover, and social engineering emails impersonating executives to extract financial gain.

The most and least secure forms of MFA

People who take advantage of multi-factor authentication often use the most insecure options, such as email and SMS-based codes that hackers can acquire with ease. In this way, the MFA space is fraught with loopholes for hackers to exploit.

There are many forms of MFA to take advantage of, but it’s important to know that some types of MFA are more secure than others. Below, I rank MFA from least secure to most secure.

5. Email code (most insecure)

For email-based MFA, the account provider sends the user a 5-10 digit alphanumeric token via email that they then input into the login page, after they’ve already input their username and password. This method of MFA does not stop phishing if this user’s account is already compromised, but they don’t know it.

4. Phone-based authentication (code sent via SMS or phone call)

Because cell phones are always on our person, online account providers use text messages and phone calls as another factor of authentication. Though convenient, this method of MFA security can be intercepted. The simplest way that hackers can interfere with this authentication process is to direct the user to a spoofed login page that forwards the phone-based MFA code to the hacker.

Spoofed login pages are particularly effective on mobile phones. Because the screens are smaller than laptops, details on the webpage that indicate an impersonation are less noticeable. According to page 14 of this year’s Verizon Data Breach Investigation Report, “Research points to users being significantly more susceptible to social attacks they receive on mobile devices.”

There are other ways hackers use your cell phone against you. After visiting your social media accounts, they could have enough information to convince an AT&T or Verizon representative to transfer your SIM card or phone number to their device. This is called “SIM swapping.” Usually, hackers would only put in this effort if the target was a public figure and there was large sums of money to be gained. Slightly more unlikely but still possible, hackers can use another vector to install malware in the cell phone and forward text message-based authentication codes to their device.

3. Authenticator apps

Phone-based apps like Google Authenticator continually generate one-time passwords that expire at frequent intervals. These time-based codes constantly rotate through the app, regardless of if the user needs them or not.

Authenticator apps are not password protected, however. The codes generated in the app are tied to the device itself, rather than the user’s online identity. While it would be very rare for a hacker to take possession of their target’s phone, it is possible for someone to discover a cell phone with a weak password (like 1234) and use their authenticator app to gain access to online accounts —especially if they use Google’s password manager, which loads credentials without requiring credentials.

2. Security keys (also known as universal 2nd factor)

Hardware-based Yubikeys and other universal 2nd factor devices are a physical rebuttal to the ethereality of the cloud, where data can be remotely accessed. Users plug these “keys” into computers like USBs, and then tap them with their finger to authenticate the application they’re trying to access. (The tap doesn’t scan for fingerprints; it’s just part of the product’s tactility.) Like magic links sent to email accounts, these hardware keys are considered a form of passwordless authentication.

Many customers experience issues with their hardware key, which is why Gmail, for example, provides backup methods of authentication in the event that they’re having trouble getting the key to work. Hardware keys are only ideal when the user configures their account so that other account recovery options are not available at login.

Why Email Multi-Factor Authentication (MFA) Security Doesn't Work (1)

Hardware-based authentication tokens (shown in the image above) are touted as the most difficult to bypass form of 2FA, but most SaaS accounts offer users alternative options in case they experience difficulties.

1. Biometrics (most secure)

Currently, there is no widespread implementation of biometric-based MFA on commercially available devices, despite the fact that most smartphones can capture biometrics. Like hardware-based keys, the physical aspect of this authentication method makes it difficult for hackers to interfere with this extremely personalized login process. Once biometric MFA becomes compatible with popular SaaS applications, it will be the most bulletproof form of MFA.

When MFA doesn’t help

Multi-factor authentication is another form of perimeter security, but the cloud has no perimeter. People often think that because they have MFA, they’re immune to phishing attacks. To be clear, MFA is not designed to stop attacks not related to logins. It only secures online accounts at the perimeter, when the user logs in to gain access.

Here are some scenarios where MFA security can not stop phishing:

  • Spoofed login pages
  • Impersonation attacks
    • CEO fraud
    • BEC
    • Fraudulent requests for the transfer of funds or W-2s
  • Embedded links to malware

Make sure everyone at your organization has MFA, and knows about out-of-band authentication.

Everyone should have multi-factor authentication. It is the bare minimum of security. Without MFA, the rest of your security is irrelevant — especially in Office 365 and G Suite.

In order to protect online accounts, users should do two things. First, they should rely on password managers to generate complicated passwords that they don’t even have to remember. Secondly, they should ensure that the most secure forms of MFA are running on their accounts. Finally, they should use out-of-band authentication whenever applicable. When your users receive a suspicious request for the transfer of funds, for example, we recommend they call the person who emailed them to confirm the request. By removing the process from online channels, they diverge from the path the hacker has guided them along and can see that they’re being phished.

Multi-factor authentication security should not be trusted as the final line of defense for authentication, even though it currently is. The immediate challenge is fortifying the MFA infrastructure so that fewer loopholes exist, and educating people using MFA on these loopholes.

Why Email Multi-Factor Authentication (MFA) Security Doesn't Work (2024)
Top Articles
Recognizing Signs of Pain in Senior Dogs
How Much Does Commercial Auto Insurance Cost? [A Guide]
Section 4Rs Dodger Stadium
Dlnet Retiree Login
Craigslist Cars And Trucks For Sale By Owner Indianapolis
Remnant Graveyard Elf
Nichole Monskey
Thotsbook Com
Mephisto Summoners War
Pac Man Deviantart
Unlv Mid Semester Classes
Tygodnik Polityka - Polityka.pl
Craigslist In Visalia California
Vintage Stock Edmond Ok
V-Pay: Sicherheit, Kosten und Alternativen - BankingGeek
Nhl Tankathon Mock Draft
Uta Kinesiology Advising
The best brunch spots in Berlin
Sadie Sink Reveals She Struggles With Imposter Syndrome
Southwest Flight 238
4 Times Rihanna Showed Solidarity for Social Movements Around the World
Costco Jobs San Diego
13301 South Orange Blossom Trail
2015 Kia Soul Serpentine Belt Diagram
Jazz Total Detox Reviews 2022
Meggen Nut
Best Laundry Mat Near Me
Ipcam Telegram Group
Puffin Asmr Leak
Frequently Asked Questions - Hy-Vee PERKS
Baddies Only .Tv
Matlab Kruskal Wallis
Powerball lottery winning numbers for Saturday, September 7. $112 million jackpot
Trebuchet Gizmo Answer Key
Junee Warehouse | Imamother
Ippa 番号
Chs.mywork
Eleceed Mangaowl
18 terrible things that happened on Friday the 13th
Henry Ford’s Greatest Achievements and Inventions - World History Edu
Lonely Wife Dating Club בקורות וחוות דעת משתמשים 2021
Ukraine-Krieg - Militärexperte: "Momentum bei den Russen"
Janaki Kalaganaledu Serial Today Episode Written Update
Grizzly Expiration Date Chart 2023
Zipformsonline Plus Login
Automatic Vehicle Accident Detection and Messageing System – IJERT
Wrentham Outlets Hours Sunday
Where Is Darla-Jean Stanton Now
Tamilblasters.wu
Obituary Roger Schaefer Update 2020
7 National Titles Forum
Latest Posts
Article information

Author: Msgr. Benton Quitzon

Last Updated:

Views: 6379

Rating: 4.2 / 5 (43 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Msgr. Benton Quitzon

Birthday: 2001-08-13

Address: 96487 Kris Cliff, Teresiafurt, WI 95201

Phone: +9418513585781

Job: Senior Designer

Hobby: Calligraphy, Rowing, Vacation, Geocaching, Web surfing, Electronics, Electronics

Introduction: My name is Msgr. Benton Quitzon, I am a comfortable, charming, thankful, happy, adventurous, handsome, precious person who loves writing and wants to share my knowledge and understanding with you.