How Hackers Are Using Phishing To Bypass 2fa
How Hackers Are Using Phishing To Bypass 2fa
To explain this process in detail, it begins with the victim entering a login
page for Office365, iCloud, Paypal etc. The target, believing the landing page
to be authentic, enters their credentials into the fake login form. The fake
login form then prompts the user with a two factor SMS request.
Meanwhile, the hacker, with access to all of the credentials entered into this
page, takes the target’s username and password and enters them into the
legitimate Google site. This can even be an automated process to carry out
this attack at scale.
After entering these details to try and access the account, Google’s real 2FA
protection kicks in and asks the hacker for the 2FA code. By doing this, an
SMS is sent to the target’s phone by Google. The hacker doesn’t even need
to know the target’s phone number.
As this attack takes place in real-time, this SMS is triggered by the hacker
within 30 seconds of the initial phishing attempt. The target then receives a
legitimate text from Google, which includes the 2FA code. As this is genuinely
from Google, there will be nothing unusual about the text – meaning there is
no cause for suspicion by the target.
The target enters this code into the phishing page, thus successfully passing
the 2FA prompt. Unknown to the target, any code will have worked in the
field as the whole login procedure is only used for harvesting credentials and
not for testing the authenticity of the target’s account information.
The code that the target enters into this field is immediately visible to the
hacker. The attacker’s next step is to use this code to complete the real
Google login process, and thus gain access to the target’s account.