ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Phishing Attacks Are Besting Two-Factor Authentication--Now What?

Phishing Attacks Are Besting Two-Factor Authentication--Now What?

What has proven to be one of the more effective ways of preventing phishing attacks may be under fire from more advanced threats designed specifically to penetrate the defenses of two-factor authentication. This means that users need to be more cognizant of avoiding these attacks, but how can you help them make educated decisions about this? Let’s start by discussing the phishing attacks that can beat 2FA.

How Has Two-Factor Authentication (2FA) Been Defeated?

There are several methods used by hackers to bypass the security benefits of 2FA. Some phishing attempts have managed to find success in convincing users to have over both their credentials and the 2FA code that is generated by a login attempt. As reported by Amnesty International, one group of hackers has been sending out phishing emails that link the recipient to a convincing fake page to reset their Google password. Sometimes fake emails can be quite convincing, making the trickery much more difficult to identify.

As Amnesty International looked into the attacks, they found that the attacks were using an automated solution to launch Chrome and submit information the user entered into their end. This meant that the 30-second time limit imposed by 2FA was of no concern.

In November 2018, an application on a third-party app store posed as an Android battery utility tool was found to be stealing funds from a user’s PayPal account. The application would change the device’s Accessibility settings to enable an accessibility overlay feature. Once it was in place, the user’s clicks would be mimicked, giving hackers the ability to send funds to their own PayPal account.

Yet another method of attack was shared publicly by Piotr Duszynski, a Polish security researcher. This method, named Modlishka, created a reverse proxy that intercepted and recorded credentials as the user attempted to plug them into an impersonated website. Modlishka would then send the credentials to the real website to hide the fact that the user’s credentials were in fact stolen. Even worse yet, if the person using Modlishka is nearby, they can steal the 2FA credentials and use them very quickly.

Protect Yourself Against 2FA Phishing Schemes

The first step toward preventing 2FA phishing attacks is to make sure you actually have 2FA implemented in the first place. While it might not seem like much of a help (after all, these attacks are designed to work around them), it is much preferable to not having 2FA at all. The most secure method of 2FA at the moment uses hardware tokens with U2F protocol. Most important of all, however, is that your team needs to be trained on the giveaway signs of phishing attacks. With these attempts that target 2FA solutions, it might not be immediately apparent, which is why it’s all the more important to remain vigilant.

At its heart, 2FA phishing is just like regular phishing, plus an additional step to bypass or replicate the secondary authentication method. Here are a few tips to ensure best practices are followed regarding phishing attempts:

  • First, check to make sure that the website you’re using is actually the one it claims to be. For example, if you’re logging in to your Google account, the login URL wouldn’t be something like logintogoogle.com. You wouldn’t believe how often spoofers will fool users in this way.
  • To help you better understand other signs of phishing attacks, check out this phishing identification skills quiz by Alphabet, Inc. We encourage your staff also look into it.

To learn more about phishing attacks, be sure to subscribe to our blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Phishing Cybersecurity Business Management IT Services Backup Ransomware Data Backup communications Smartphone Small Business Microsoft Office Upgrade Smartphones Network Mobile Devices Communication Managed IT Services Data Recovery Quick Tips Productivity VoIP Users Social Media Mobile Device Tech Term Automation Windows 10 Facebook Business Continuity Covid-19 Disaster Recovery Passwords Holiday Windows 10 Managed Service Apps IT Support Browser Miscellaneous Cloud Computing Outsourced IT Data Management Remote Work Internet of Things Managed Service Provider Government Saving Money Operating System Artificial Intelligence Gadgets Managed IT services Workplace Strategy Networking Windows App Virtualization Information Spam Business Technology Remote Bandwidth Mobile Device Management Encryption Blockchain WiFi Server Information Technology Office Two-factor Authentication Office 365 History Budget Employee/Employer Relationship Apple Gmail Conferencing BDR Health Wi-Fi Cybercrime Analytics Access Control Data Security Big Data Patch Management Help Desk Hacking Document Management Remote Monitoring Save Money Vendor Employer-Employee Relationship Hacker IT Management Training Compliance Remote Computing Voice over Internet Protocol Cost Management Managed Services Legal Project Management Data storage Search... Best Practice Applications Money Retail Vulnerabilities Customer Service Alert Unified Threat Management Firewall BYOD Hiring/Firing Augmented Reality Computing Outlook Word Password Vendor Management Hard Drive IBM Website Data loss Mobile Office Law Enforcement Free Resource End of Support Paperless Office The Internet of Things YouTube Mobile Computing Antivirus Printer Maintenance How To Marketing Running Cable Data Breach Laptop Travel Virtual Reality Websites Storage Social Engineering Mobility Cryptocurrency Meetings Black Market Monitoring Social Cleaning Sports Google Maps SaaS DDoS Scam Robot Healthcare User Windows 11 iPhone Education Cortana VPN Content Filtering Update Chrome Remote Workers Router Twitter Windows 7 Administration Virtual Private Network Microchip Flexibility Presentation Specifications Virtual Assistant Current Events IT Consultant Physical Security Solutions Hack Identity Theft Wireless Technology Notifications eWaste Customer Relationship Management Unified Communications Co-Managed IT Integration Images 101 Entertainment Google Docs Start Menu Display Processor Downloads Bluetooth Computer Care Downtime Safety Distributed Denial of Service Vulnerability Office Tips Private Cloud Memory Employees Virtual Desktop Avoiding Downtime Software as a Service Data Protection Experience Multi-factor Authentication Holidays Politics Cooperation Machine Learning Settings HIPAA Video Conferencing Saving Time Disaster Solid State Drive Virtual Machines Bitcoin Computer Repair Computers Tech Terms Professional Services Telephone Lithium-ion battery Drones Chromebook Managed IT Digital Automobile Excel Processors Managed Services Provider Taxes How To PowerPoint Tip of the week Fileless Malware Google Apps Gamification Audit Electronic Payment Company Culture Telework Spyware File Sharing Microsoft 365 Cables Telephone System In Internet of Things Regulations Smartwatch Communitications Redundancy Network Congestion Procurement Directions Backup and Disaster Recovery Hacks Public Speaking Content Reliable Computing Desktop Writing FinTech Cache Phone System IT Assessment Workers Streaming Media Point of Sale Electronic Medical Records Accountants CES Unified Threat Management Supply Chain Management Value Keyboard Database Shortcuts Hard Drives Scalability Printing Organization Cyber security CCTV Smart Devices Health IT Administrator intranet Equifax Text Messaging Touchscreen Proactive IT Tactics Bring Your Own Device Emergency Hard Drive Disposal Remote Working Computer Accessories Computer Malfunction Wireless Shortcut Be Proactive Heating/Cooling Username Environment AI Vendor Mangement Trend Micro Freedom of Information Music Electronic Health Records Samsung Windows XP Transportation Social Networking Startup Digital Security Cameras Addiction email scam Uninterrupted Power Supply Wasting Time Webcam Navigation Modem Workplace Strategies Mobile Security Business Mangement eCommerce News Surveillance Tablets User Tip Botnet Legislation Videos Network Management Rental Service Micrsooft Managing Costs Evernote SSID Google Calendar Flash Supercomputer Troubleshooting Fake News Business Growth Development Employer/Employee Relationships Proxy Server Emails Telephone Systems Media Virus Service Level Agreement Computing Infrastructure Virtual Machine Motion Sickness Staffing Smart Technology IP Address Management Comparison Device security Reviews Google Drive Optimization Microsoft Excel Google Wallet Teamwork Wireless Headphones Banking 2FA Going Green Messenger Knowledge Business Cards Deep Learning Data Storage Corporate Profile Hypervisor Tech Medical IT Error Television Shopping Telephony Employer Employee Relationship Business Owner Hosted Solution Cabling SQL Server Bookmark Business Metrics Paperless Download Books Piracy PCI DSS Tablet Licensing G Suite Recovery Term Competition Supply Chain Mouse HTML Language Gig Economy VoIP Society Humor Tracking Internet Service Provider LiFi Azure Browsers Entrepreneur Nanotechnology Business Communications Upload Reading Software License Monitors Regulations Compliance Visible Light Communication Managed IT Service Web Server Documents Google Play Application Workplace Social Network SharePoint Business Intelligence Windows 8 Memes Digital Payment Inbound Marketing Net Neutrality Worker Data Analysis Screen Reader Human Resources Trends Relocation Mobile Technology Displays Financial Data Access Advertising Securty Security Cameras Scams Domains Customer Resource management Devices Work/Life Balance Risk Management Time Management Tech Support IT Public Cloud

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?