AI ANSWER. But it is Good and Informative. Everything is exploitable just like
@oldschool said. Here is 8 attacks on 2FA.
Q: I have heard that there are some attacks that can attack 2FA protected accounts. How do those work?
Thought for 12s
Yes. 2FA helps a lot, but it does
not make accounts immune. Most “2FA bypass” attacks do not break cryptography. They attack the
user, device, session, recovery path, or login flow.
The main ones:
1. Real-time phishing / adversary-in-the-middle
This is the big one.
The attacker creates a fake login page that looks like the real site. You enter:
- username
- password
- 2FA code or approve a push prompt
But the fake site is acting as a relay to the real site in real time.
So when you type the TOTP code, the attacker immediately submits it to the real service. If login succeeds, the attacker gets the authenticated session cookie.
Key point: the attacker does
not need to know your future 2FA codes. They only need to use the current one quickly.
This works against:
- SMS codes
- email codes
- authenticator-app TOTP codes
- push approvals, if the victim approves the attacker’s login
It is much weaker against:
- FIDO2/WebAuthn security keys
- properly implemented passkeys
because those are bound to the real website origin. A fake domain cannot usually get a valid authentication response for the real domain.
2. Session-cookie theft
After you log in successfully, the website gives your browser a session cookie. That cookie proves you are already authenticated.
Malware, a malicious browser extension, infostealer malware, or local compromise can steal that session cookie. The attacker then imports/reuses it and appears logged in without needing the password or 2FA code.
This is why 2FA does not fully protect a compromised endpoint.
Defenses:
- avoid browser extensions you do not absolutely need
- use separate browser profiles for sensitive accounts
- use phishing-resistant MFA
- log out of high-value accounts when done
- revoke sessions after compromise
- harden the endpoint, not only the account
3. MFA push bombing / prompt fatigue
The attacker already has the password. They repeatedly try to log in, causing push notifications:
Eventually the victim clicks approve to make it stop, or because they think it is a glitch.
This is common with push-based MFA.
Better systems use:
- number matching
- location/device display
- requiring the user to type a number shown on the login screen
- blocking repeated push attempts
- phishing-resistant security keys instead of push approvals
4. SIM swap / phone-number takeover
If SMS is used for 2FA, the attacker can try to take over the victim’s phone number by convincing the carrier to move the number to a new SIM/eSIM.
Then SMS codes go to the attacker.
This is why SMS 2FA is considered one of the weaker forms of 2FA. It is still better than no 2FA, but it is not strong protection against targeted attackers.
5. Account recovery bypass
Sometimes the 2FA is strong, but the recovery path is weak.
Example:
- “Forgot password?”
- recovery email compromised
- phone number taken over
- security questions guessed
- helpdesk/social engineering
- backup codes stolen
- old logged-in device still trusted
The attacker does not defeat 2FA. They bypass it by using account recovery.
For important accounts, recovery mechanisms need to be protected as carefully as the main login.
6. OAuth / consent attacks
Instead of stealing your password, the attacker tricks you into granting a malicious app access to your account.
For example, a fake “document viewer” or “security scanner” asks for permission to read email, contacts, files, or cloud storage.
You may successfully pass 2FA, but then you authorize the attacker’s app. After that, the attacker uses the granted token/API permission.
This is common in Microsoft/Google cloud environments, but the general idea applies elsewhere too.
7. Compromised trusted device
Many services have “remember this device” or “trusted browser” settings.
If the attacker gets access to a device/browser that is already trusted, they may not need to pass 2FA again.
This can happen through:
- stolen laptop
- remote-access malware
- browser profile theft
- backup extraction
- cloud-synced browser data
- compromised password manager session
8. Weak backup codes
Many 2FA systems provide backup codes. If those are stored in plaintext in email, cloud notes, screenshots, or a Downloads folder, the attacker can use them.
Backup codes are effectively alternate passwords. They need to be printed, stored offline, or kept in a highly protected password manager.
Ranking of 2FA strength
From weaker to stronger:
- Email code — weak if email is compromised
- SMS code — vulnerable to SIM swap and carrier abuse
- TOTP authenticator app — good, but phishable in real time
- Push approval — convenient, but vulnerable to prompt fatigue unless number matching is used
- FIDO2/WebAuthn security key or passkey — strongest common option; resistant to ordinary phishing because it is bound to the real site domain
The main takeaway:
2FA is strongest when it is phishing-resistant. TOTP is good against password reuse and credential stuffing, but it does not fully stop a real-time phishing proxy. For high-value accounts, use FIDO2 security keys or passkeys, disable SMS recovery where possible, protect recovery email, and periodically revoke old sessions.
==========================================
As you all know, I shamelessly promote FIDO / Yubikeys. Only costs $25 each. Cheaper than an AV subscription. Lasts years.
Join Google Advanced Protection. Sign up with Yubikey. Use "Sign in with Google" everywhere. You get 2FA protection everywhere where Google Sign-in is supported.