Its now well known that usernames and passwords arent enough to securely access online services.

As such, the implementation of two-factor authentication (2FA) has become a necessity.

Generally, 2FA aims to provide an additional layer of security to the relatively vulnerable username/password system.

Here’s how hackers are cracking two-factor authentication security

Figures suggest users who enabled 2FA ended up blocking about99.9% of automated attacks.

But as with any good cybersecurity solution, attackers can quickly come up with ways to circumvent it.

They can bypass 2FA through the one-time codes sent as an SMS to a users smartphone.

So whats the problem with SMS?

Major vendors such asMicrosofthave urged users to abandon 2FA solutions that leverage SMS and voice calls.

For example,SIM swappinghas been demonstrated as a way to circumvent 2FA.

This facilitates communication between the victim and a service being impersonated.

In addition to these existing vulnerabilities, our team has found additional vulnerabilities in SMS-based 2FA.

Using apassword manageris an effective way to make your first line of authentication your username/password login more secure.

More importantly, this attack doesnt need high-end technical capabilities.

[Read:Will physical banking become obsolete?]

Whats the alternative?

To remain protected online, you should check whether your initial line of defense is secure.

First, check your password to see if its compromised.

There are a number ofsecurity programsthat will let you do this.

And check that youre using a well-crafted password.

it’s possible for you to instead use app-based one-time codes, such as through Google Authenticator.

However, this approach can also be compromised by hackers using somesophisticated malware.

A better alternative would be to use dedicated hardware devices such asYubiKey.

Also tagged with