Can I still be hacked with 2FA enabled? (2024)

Cybersecurity is like a game of whack-a-mole. As soon as the good guys put a stop to one type of attack, another pops up.

Usernames and passwords were once good enough to keep an account secure. But before long, cybercriminals figured out how to get around this.

Often they’ll use “brute force attacks”, bombarding a user’s account with various password and login combinations in a bid to guess the correct one.

To deal with such attacks, a second layer of security was added in an approach known as two-factor authentication, or 2FA. It’s widespread now, but does 2FA also leave room for loopholes cybercriminals can exploit?

2FA via text message

There are various types of 2FA. The most common method is to be sent a single-use code as an SMS message to your phone, which you then enter following a prompt from the website or service you’re trying to access.

Most of us are familiar with this method as it’s favoured by major social media platforms. However, while it may seem safe enough, it isn’t necessarily.

Hackers have been known to trick mobile phone carriers (such as Telstra or Optus) into transferring a victim’s phone number to their own phone.

Read more: $2.5 billion lost over a decade: 'Nigerian princes' lose their sheen, but scams are on the rise

Pretending to be the intended victim, the hacker contacts the carrier with a story about losing their phone, requesting a new SIM with the victim’s number to be sent to them. Any authentication code sent to that number then goes directly to the hacker, granting them access to the victim’s accounts.
This method is called SIM swapping. It’s probably the easiest of several types of scams that can circumvent 2FA.

And while carriers’ verification processes for SIM requests are improving, a competent trickster can talk their way around them.

Authenticator apps

The authenticator method is more secure than 2FA via text message. It works on a principle known as TOTP, or “time-based one-time password”.

TOTP is more secure than SMS because a code is generated on your device rather than being sent across the network, where it might be intercepted.

The authenticator method uses apps such as Google Authenticator, LastPass, 1Password, Microsoft Authenticator, Authy and Yubico.

However, while it’s safer than 2FA via SMS, there have been reports of hackers stealing authentication codes from Android smartphones. They do this by tricking the user into installing malware (software designed to cause harm) that copies and sends the codes to the hacker.

The Android operating system is easier to hack than the iPhone iOS. Apple’s iOS is proprietary, while Android is open-source, making it easier to install malware on.

2FA using details unique to you

Biometric methods are another form of 2FA. These include fingerprint login, face recognition, retinal or iris scans, and voice recognition. Biometric identification is becoming popular for its ease of use.

Most smartphones today can be unlocked by placing a finger on the scanner or letting the camera scan your face – much quicker than entering a password or passcode.

However, biometric data can be hacked, too, either from the servers where they are stored or from the software that processes the data.

One case in point is last year’s Biostar 2 data breach in which nearly 28 million biometric records were hacked. BioStar 2 is a security system that uses facial recognition and fingerprinting technology to help organisations secure access to buildings.

There can also be false negatives and false positives in biometric recognition. Dirt on the fingerprint reader or on the person’s finger can lead to false negatives. Also, faces can sometimes be similar enough to fool facial recognition systems.

Another type of 2FA comes in the form of personal security questions such as “what city did your parents meet in?” or “what was your first pet’s name?”

Read more: Don't be phish food! Tips to avoid sharing your personal information online

Only the most determined and resourceful hacker will be able to find answers to these questions. It’s unlikely, but still possible, especially as more of us adopt public online profiles.

2FA remains best practice

Despite all of the above, the biggest vulnerability to being hacked is still the human factor. Successful hackers have a bewildering array of psychological tricks in their arsenal.

A cyber attack could come as a polite request, a scary warning, a message ostensibly from a friend or colleague, or an intriguing “clickbait” link in an email.

The best way to protect yourself from hackers is to develop a healthy amount of scepticism. If you carefully check websites and links before clicking through and also use 2FA, the chances of being hacked become vanishingly small.

The bottom line is that 2FA is effective at keeping your accounts safe. However, try to avoid the less secure SMS method when given the option.

Just as burglars in the real world focus on houses with poor security, hackers on the internet look for weaknesses.

And while any security measure can be overcome with enough effort, a hacker won’t make that investment unless they stand to gain something of greater value.

Can I still be hacked with 2FA enabled? (2024)
Top Articles
5 health benefits of bananas to incorporate into your fitness sessions
Iceland Government Debt: % of GDP, 1998 – 2024
Using GPT for translation: How to get the best outcomes
Euro (EUR), aktuální kurzy měn
Chalupp's Pizza Taos Menu
50 Meowbahh Fun Facts: Net Worth, Age, Birthday, Face Reveal, YouTube Earnings, Girlfriend, Doxxed, Discord, Fanart, TikTok, Instagram, Etc
According To The Wall Street Journal Weegy
Lowes 385
Mlifeinsider Okta
83600 Block Of 11Th Street East Palmdale Ca
Gt Transfer Equivalency
Purple Crip Strain Leafly
MindWare : Customer Reviews : Hocus Pocus Magic Show Kit
Flower Mound Clavicle Trauma
2024 U-Haul ® Truck Rental Review
Kaomoji Border
978-0137606801
Nj State Police Private Detective Unit
Jesus Calling Oct 27
Kitty Piggy Ssbbw
Nutrislice Menus
Uky Linkblue Login
Craigslist In Flagstaff
Georgia Vehicle Registration Fees Calculator
CVS Near Me | Columbus, NE
Somewhere In Queens Showtimes Near The Maple Theater
Ac-15 Gungeon
Hannaford To-Go: Grocery Curbside Pickup
California Online Traffic School
Speechwire Login
Hwy 57 Nursery Michie Tn
Kuttymovies. Com
In hunt for cartel hitmen, Texas Ranger's biggest obstacle may be the border itself (2024)
Askhistorians Book List
Tu Housing Portal
Willys Pickup For Sale Craigslist
Abga Gestation Calculator
Current Time In Maryland
Kokomo Mugshots Busted
Bt33Nhn
Darrell Waltrip Off Road Center
Top-ranked Wisconsin beats Marquette in front of record volleyball crowd at Fiserv Forum. What we learned.
Ig Weekend Dow
Subdomain Finder
Sig Mlok Bayonet Mount
Courses In Touch
Big Brother 23: Wiki, Vote, Cast, Release Date, Contestants, Winner, Elimination
Spongebob Meme Pic
Verilife Williamsport Reviews
Metra Union Pacific West Schedule
E. 81 St. Deli Menu
Latest Posts
Article information

Author: Reed Wilderman

Last Updated:

Views: 5689

Rating: 4.1 / 5 (72 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Reed Wilderman

Birthday: 1992-06-14

Address: 998 Estell Village, Lake Oscarberg, SD 48713-6877

Phone: +21813267449721

Job: Technology Engineer

Hobby: Swimming, Do it yourself, Beekeeping, Lapidary, Cosplaying, Hiking, Graffiti

Introduction: My name is Reed Wilderman, I am a faithful, bright, lucky, adventurous, lively, rich, vast person who loves writing and wants to share my knowledge and understanding with you.